Zusammenfassung der Ressource
cyber
security
- key terms
- un atorised entery
- un wanted access to your computer
- attack
- internet
- external
- caused out
side of the
orginisation
- incident
- cyber security
- hackers
- some one that gets into a compuer
- a person or thing that hacks technoligy
- types of threates
- malware
- pecifically designed
to disrupt,
damage, or gain
unauthorized
access to a
computer system.
- Trojan Horse:
- Rootkit
- Ransomware:
- Encrypts files stored on a computer to extort/demand or steal money from organisations.
- spyware
- Is secretly installed to collect information from someone else's computer
- keyloggers
- spyware that records every
keystroke made on a computer
to steal personal information
- social enjenering
- Shoulder Surfing/Shouldering
- It involves the attacker
watching the victim while they
provide sensitive information
- Phishing
- is an attack in which the victim receives an
email disguised to look as if it has come from a
reputable source, in order to trick them into
giving up valuable data. The email usually
provides a link to another website where the
information can be inputted.
- Pharming
- s when a victim redirects
the user from a genuine
website to a fake one.
- Blagging/Pretexting
- is an attack in which the
perpetrator invents a scenario in
order to convince the victim to
give them data or money.
- Tailgating/Piggybacking
- Trying to gain access to a secure room or building.
- Baiting
- Cyber criminals make a promise of goods to get the information that they need.