Zusammenfassung der Ressource
Cyber Security
- Key terms
- Attack
- An attack is a dilibrate
action , targeting an
organisation’s digital
system or data.
- Unauthorised Access
- This refers to someone
gaining entry without
permission to an
organisation’s system,
software or data. This
achieved by exploiting a
security vulnerability
- Cyber Security
- it refers to the range of
measures that can be taken
to protect computer
systems, networks and
data from unauthorised
access or cyberattack.
- Threat
- A threat is an incident or an action
which is deliberate or unintended
that results in disruption, down time
or data loss.
- internal
- caused by an incident inside
an organisation
- external
- caused outside the
organisation
- Hackers
- is someone who seeks out and
exploits these vulnerabilities.
- Hat Hackers
- white
- is someone who works with
organizations to strengthen
the security of a system
- Grey
- is someone who does it
for fun and not with
malicious intent
- Black
- is someone who tries to inflict
damage by compromising
security systems
- Types of Threat
- Malware
- MaliciousSoftware
- This is an umbrella term
given to software that is
designed to harm a digital
system, damage data or
harvest sensitive
information.
- Virus
- A piece of malicious code that
attaches to a legitimate program. It
is capable of reproducing itself and
usually capable of causing great
harm to files or other programs on
the same computer
- Worm
- Worms get around by
exploiting
vulnerabilities in
operating systems and
attaching themselves
to emails. They self
replicate at a
tremendous rate,
using up hard drive
space and bandwidth,
overloading servers.
- Trojan Horse
- Users are tricked into
downloading it to their
computer. Once installed the
Trojan works undercover to
carry out a predetermined
task.
- Rootkit
- Designed to
remotely access and
control a computer
system without
being detected by
security software or
the user.
- Ransomware
- Encrypts files
stored on a
computer to
extort/demand
or steal money
from
organisations.
- Spyware
- Is secretly
installed to
collect
information
from someone
else's computer
- Keyloggers
- Spyware that records
every keystroke
made on a computer
to steal personal
information
- Adware
- Automatically shows adverts such as
popups. Most adware is harmless
but some contain spyware such as
keyloggers
- Botnet
- Bots take control of a
computer system, without the
user’s knowledge. A botnet is a
large collection of
malware-infected devices
(zombies). An attacker (‘bot
herder’) chooses when to
‘wake’ the zombies to perform
an attack.
- Distributed Denial-of-Service
attack (DDoS attack)
- flooding a website with
useless traffic to inundate
and overwhelm the
network
- Social Engineering:
- Shoulder Surfing/Shouldering
- It involves the attacker
watching the victim
while they provide
sensitive information
- Phishing
- is an attack in which the victim receives
an email disguised to look as if it has
come from a reputable source, in order
to trick them into giving up valuable
data. The email usually provides a link
to another website where the
information can be inputted.
- Pharming
- is when a victim
redirects the
user from a
genuine website
to a fake one.
- Blagging/Pretexting
- is an attack in which the perpetrator
invents a scenario in order to convince
the victim to give them data or money.
- Tailgating/Piggybacking
- Trying to gain access to a
secure room or building.
- Baiting
- Cyber criminals make a promise of goods
to get the information that they need.