Zusammenfassung der Ressource
cyber security
- key terms
- threat
- internal threat
- caused by an incident inside an organisation
- external threat
- caused outside the
organisation
- A threat is an incident or an action which is deliberate or unintended that results in disruption, down
time or data loss.
- attack
- An attack is a deliberate action, targeting an organisation’s digital system or
data.
- unauthorised access
- This refers to someone gaining entry without permission to an organisation’s system, software or
data. This achieved by exploiting a security vulnerability
- hackers
- is someone who seeks out and exploits these vulnerabilities.
- black hat hackers
- is someone who tries to inflict damage by compromising security systems
- GREY HAT HACKER
- is someone who does it for fun and not with malicious intent
- WHITE HAT HACKER
- is someone who works with organizations to strengthen the security of a system
- malware
- Trojan Horse
- Users are tricked into downloading it to their computer. Once installed the Trojan works undercover
to carry out a predetermined task.
- Rootkit
- Designed to remotely access and control a computer system without being detected by security
software or the user.
- Ransomware
- Encrypts files stored on a computer to extort/demand or steal money from organisations.
- Spyware
- Is secretly installed to collect information from someone else's computer
- Keyloggers
- spyware that records every keystroke made on a computer to steal personal information
- Adware
- Automatically shows adverts such as popups.
- social engineering
- is a set of methods used by cybercriminals to deceive individuals into handing over information that
they can use for fraudulent purposes
- Shoulder Surfing/Shouldering
- It involves the attacker watching the victim while they provide sensitive information
- Phishing
- is an attack in which the victim receives an email disguised to look as if it has come from a reputable
source
- Pharming
- is when a victim redirects the user from a genuine website to a fake one.
- Blagging
- is an attack in which the perpetrator invents a scenario in order to convince the victim to give them
data or money.
- Tailgating
- Trying to gain access to a secure room or building.
- Baiting
- Cyber criminals make a promise of goods to get the information that they need.
- Quid Pro Quo
- Cyber criminals make a promise of a service to get the information that they need.