Zusammenfassung der Ressource
cyber security
- key terms
- attack
- An attack is a deliberate action,
targeting an organisation’s digital
system or data.
- Cyber Security
- refers to the range of measures that can be taken to protect
computer systems, networks and data from unauthorised
access or cyberattack.
- Unauthorised Access
- This refers to someone gaining entry without permission to an
organisation’s system, software or data.
- threat
- Internal Threat
- caused by an incident
inside an organisation
- External Threat
- caused outside the
organisation
- A threat is an incident or an action which is deliberate or
unintended that results in disruption, down time or data loss.
- hackers
- BLACK HAT HACKER
- is someone who tries to inflict damage by
compromising security systems
- GREY HAT HACKER
- is someone who does it for fun
and not with malicious intent
- is someone who seeks out
and exploits these
vulnerabilities.
- WHITE HAT HACKER
- is someone who works with
organizations to strengthen the
security of a system
- Types of Threat
- Malicious Software
- This is an umbrella term given to software that is designed to
harm a digital system, damage data or harvest sensitive
information.
- Virus
- A piece of malicious code that attaches to a legitimate
program. It is capable of reproducing itself and usually
capable of causing great harm to files or other programs on
the same computer
- worms
- Worms get around by exploiting
vulnerabilities in operating systems and
attaching themselves to emails.
- They self replicate at a tremendous rate, using up hard drive space and
bandwidth, overloading servers.
- Trojan Horse
- Users are tricked into downloading it to their computer. Once
installed the Trojan works undercover to carry out a
predetermined task.
- Rootkit
- Designed to remotely access and control a computer system without being
detected by security software or the user.
- Ransomware
- Encrypts files stored on a computer to extort/demand or steal
money from organisations.
- Spyware
- Is secretly installed to collect information from
someone else's computer
- Keyloggers
- spyware that records every keystroke made on a computer to steal
personal information
- Adware
- Automatically shows adverts such as popups. Most
adware is harmless but some contain spyware such
as keyloggers
- Distributed Denial-of-Service
attack (DDoS attack)
- flooding a website with useless traffic to inundate and
overwhelm the network
- Social Engineering
- is a set of methods used by
cybercriminals to deceive individuals
into handing over information that
they can use for fraudulent purposes
- Shoulder
Surfing/Shouldering
- It involves the attacker watching the victim while
they provide sensitive information
- Phishing
- is an attack in which the victim receives an email
disguised to look as if it has come from a reputable
source, in order to trick them into giving up valuable
data. The email usually provides a link to another
website where the information can be inputted.
- Pharming
- is when a victim redirects the user
from a genuine website to a fake
one.
- Blagging/Pretexting
- is an attack in which the perpetrator invents a scenario in order
to convince the victim to give them data or money.
- Tailgating/Piggybacking
- Trying to gain access to a
secure room or building.
- Baiting
- Cyber criminals make a promise of goods to get
the information that they need.
- Quid Pro Quo
- Cyber criminals make a promise of a service
to get the information that they need.