Zusammenfassung der Ressource
Cyber Security
- Key Terms
- Attack
- is a deliberate action, targeting an
organisation’s digital system or data
- Threat
- Internal
- caused by an incident
inside an organisation
- External
- caused outside the
organisation
- is an incident or an action which is
deliberate or unintended that results in
disruption, down time or data loss
- Cyber Security
- refers to the range of measures that can
be taken to protect computer systems,
networks and data from unauthorised
access or cyber attack
- Unauthorised Access
- refers to someone gaining entry without
permission to an organisation’s system,
software or data
- can be achieved by exploiting a
security vulnerability
- Hackers
- is someone who seeks out and exploits
these vulnerabilities
- Black Hat Hacker
- is someone who tries to inflict
damage by compromising
security systems
- White Hat Hacker
- is someone who works with organisations
to strengthen the security of a system
- Grey Hat Hacker
- is someone who does it for fun
and not with malicious intent
- Types Of Threats
- Mallware
- Malicious Software
- is an umbrella term given to software
that is designed to harm a digital
system, damage data or harvest
sensitive information
- Virus
- is a piece of malicious code that
attaches to a legitimate program. It is
capable of reproducing itself and
usually capable of causing great harm
to files or other programs on the same
computer
- Worm
- get around by exploiting vulnerabilities in operating
systems and attaching themselves to emails
- self replicate at a tremendous rate, using up hard drive
space and bandwidth, overloading servers
- Trojan Horse
- users are tricked into downloading it to their
computer, once installed the Trojan works
undercover to carry out a predetermined task
- Trojan Horse
- users are tricked into downloading it to their
computer, once installed the Trojan works
undercover to carry out a predetermined task
- Rootkit
- designed to remotely access and control
a computer system without being
detected by security software or the user
- Ransomware
- encrypts files stored on a computer to
extort/demand or steal money from
organisations
- Spyware
- is secretly installed to collect information from
someone else's computer
- Keyloggers
- spyware that records every keystroke made on a
computer to steal personal information
- Adware
- automatically shows adverts such as popups, most
adware is harmless but some contain spyware
such as keyloggers
- Botnet
- bots take control of a computer system, without the
user’s knowledge, a botnet is a large collection of
malware-infected devices (zombies), an attacker (‘bot
herder’) chooses when to ‘wake’ the zombies to
perform an attack
- DDOS Attack
- this stands for distrebuted denial of service attack and it
involves flooding a website with useless traffic to
inundate and overwhelm the network
- Social Engineering
- is a set of methods used by cybercriminals to deceive
individuals into handing over information that they can use
for fraudulent purposes
- Shoulder Surfing/Shouldering
- It involves the attacker watching the victim
while they provide sensitive information
- Phishing
- is an attack in which the victim receives an email disguised to
look as if it has come from a reputable source, in order to trick
them into giving up valuable data. The email usually provides a
link to another website where the information can be inputted
- Pharming
- is when a victim redirects the user from a genuine
website to a fake one. Some pharming sites are so
expertly copied from the genuine website that it is
very difficult to identity therefore this is carried out
without the user knowing about it
- Blagging/Pretexting
- is an attack in which the perpetrator invents a scenario in order
to convince the victim to give them data or money
- Tailgating /
Piggybacking
- trying to gain access to a
secure room or building
- Baiting
- cyber criminals make a
promise of goods to get the
information that they need
- Quid Pro Quo
- cyber criminals make a
promise of a service to get the
information that they need