Zusammenfassung der Ressource
Cyber Security
- KEY TERMS
- unauthorised Access
- Gaining entry to an organisation's
system, software, without permission
to. This is achieved through
exploiting a security vulnerability.
- Cyber
Security
- A range of measures taken to protect
computer systems, networks and data
from unauthorised access or
cyberattacks
- Threat
- An incident or action which is deliberate,
which results in disruption, downtime or
data loss.
- External Threat
- Caused outside the
organisation
- Internal Threat
- Caused by an incident
inside of an organisation
- Attack
- A deliberate action, targeting an
organisation's digital system or
data
- HACKERS
- Someone who seeks out and
exploits these vulnerability
- Black Hat
Hacker
- Someone who tries to inflict
damage by compromising
security systems
- Grey Hat
Hacker
- Someone who does it for
fun and not with malicious
intent
- White Hat
Hacker
- Someone who works with
organisations to strengthen
the security of a system
- TYPES OF
THREATS
- Malware
- Malicious software. This is
an umbrella term given to
software which is designed
to harm a digital system,
damage data or harvest
sensitive information
- Virus
- A piece of malicious code that attaches
to a legitimate program. It is capable of
reproducing itself and usually capable
of causing great harm to files or other
programs on the same computer
- Worm
- Worms get around by exploiting
vulnerabilities in operating
systems and attaching
themselves to emails. They self
replicate at a tremendous rate,
using up hard drive space and
bandwidth, overloading servers.
- Trojan Horse
- Users are tricked into
downloading it to their
computers. Once
installed the Trojan works
undercover to carry out a
predetermined task.
- Rootkit
- Designed to remotely access
and control a computer
system without being
detected by security
software of the user.
- Ransomware
- Encrypts files stored on a
computer to extort/demand or
steal money from
organisations.
- Spyware
- Is secretly installed to collect
information from someone else's
computer.
- Keyloggers
- Spyware that records every
keystroke made on a
computer to steal personal
information.
- Adware
- Automatically shows adverts such as
popups. Most adware is harmless but
some contain spyware such as
keyloggers.
- Distributed
Denial-of-service attack
(DDoS attack)
- Flooding a website with useless
traffic to inundate and overwhelm
the network.
- Botnet
- Bots take control of computer systems , without users
knowledge. A botnet is a large collection of
malware-infected devices(zombies). An attacker (bot
herder)chooses when to 'wake' the zombies to perform
an attack.
- Social Engineering
- Is a set of methods used by
cybercrimminals to decieve individuals
into handing over information that they
can use for fraudulent purposes.
- Shoulder surfing/shouldering
- Involves the attacker
watching a victim while they
provide sensitive information.
- Phishing
- Is an attack in which a victim recieves an email disguised to
look as if it has come from a ruptable source,in order to
trick them into giving valuable data.
- This email usually provides a link to
another website where the information
can be imputted.
- Pharming
- Is when a victim redirects the user
from a genuine website to a fake
one.
- Some phrming sites are so expertly copied
from the genuine website that it is very
difficult to identify therefore this is carried
out without the user knowing about it.
- Blagging/Pretexting
- Is an attack in which the perpetrator invents a
scenario in order to convince the victim to give
them data or money.
- Tailgating/ piggybacking
- Trying to gain access to a secure
room or building.
- Baiting
- Cyber crimminals make a promise of goods to get
information that they need.
- Quid pro quo
- cyber crimminals make a promise of service to get
information they need.