Zusammenfassung der Ressource
Cyber Security
- Key Terms
- Threats
- external
- Caused outside of the
organisation
- internal
- Caused by an incident inside of an
organisation
- A threat is an incident or an action which is deliberate or
unintended that results in disruption, down time or data loss.
- Attack
- An attack is a deliberate action, targeting an
organisation’s digital system or data.
- Unauthorised Access
- This refers to someone gaining entry without permission to an
organisation’s system, software or data. This achieved by exploiting
a security vulnerability
- Cyber Security
- Refers to the range of measures that can be taken
to protect computer systems, networks and data
from unauthorised access or cyberattack.
- Trojan Horse
- Users are tricked into downloading it to their
computer. Once installed the Trojan works
undercover to carry out a predetermined task.
- Rootkit
- Designed to remotely access and control a computer system without being
detected by security software or the user.
- Keyloggers
- spyware that records every keystroke made on a
computer to steal personal information
- Spyware
- Is secretly installed to collect information
from someone else's computer
- DDoS attack
- flooding a website with useless traffic to
inundate and overwhelm the network
- Ransomware
- Encrypts files stored on a computer to extort/demand or
steal money from organisations.
- Adware
- Automatically shows adverts such as popups.
- Botnet
- Bots take control of a computer system,
without the user’s knowledge.
- Pharming
- is when a victim redirects the user from a genuine
website to a fake one.
- Shoulder Surfing/Shouldering
- It involves the attacker
watching the victim while they
provide sensitive information
- Baiting
- Cyber criminals make a promise of goods to get the
information that they need.
- Blagging/Pretexting
- is an attack in which the perpetrator invents a scenario in
order to convince the victim to give them data or money.
- Phishing
- is an attack in which the victim receives an email disguised
to look as if it has come from a reputable source, in order
to trick them into giving up valuable data.
- Tailgating/Piggybacking
- Trying to gain access to a secure
room or building.
- Social Engineering
- is a set of methods used by cybercriminals to deceive individuals into
handing over information that they can use for fraudulent purposes
- Quid Pro Quo
- Cyber criminals make a promise of a
service to get the information that they
need.
- Hackers
- Black hat hackers
- Grey hat hackers
- White hat hackers
- Someone who seeks out and
exploits these vulnerabilities.