Zusammenfassung der Ressource
cyber security
- key terms
- unauthorised access
- refers to someone gaining entry without permision to a system
- attack
- a delibarate action targeting an
organisations digital systems
- threat
- internal
- incident inside an
organisation
- external
- caused outside the
organisation
- an action that is delibarate
- cyber security
- refers to range of measures that can be taken to protect computer
systems networks and data from unauthorised access or cyber attack
- hackers
- someone who seeks out and exploits these vulnerabilities.
- Black hat hacker
- someone who tries to inflict damage by compramising security
systems
- grey hat hacker
- someone who does it for fun and not with malicious intent
- white hat hacker
- someone who works with organisation to strengthen the
security systems
- types of threats
- malicious software
- this an umbrella term given to a software that
is designed to harm digital systems
- virus
- a piece of malicious code that attaches to a legitimate programme
- worm
- worms get around by exploiting vulnerbilities is digital systems
- malware
- trojan horse
- users are tricked to download it onto their computers once installed it does the permitted task
- Rootkit
- designed to acceess and control a
computer system without being
detected
- ransomware
- encrypts files stored on a computer to steal money
- spyware
- secretly installed to collect
information
- key loggers
- spyware that records every keystroke to steal information
- adware
- autimaticy shows adverts and popups
- bot net
- bots take control of the system without the user noticing
- DDoS
- social engineering
- shoulder surfing
- watching the victim
over their shoulder
while they put in
information
- phising
- the victim recieves an email that
looks serious but is a scam
- pharming
- the victim gets redirected
from one website to a fake
one
- blagging
- the attacker gives the
victim a scenario so
they give them money
- tailgating
- trying to gain access to secure a room or building
- quid pro quo
- cyber criminals make a promise and
then they get what they need