Zusammenfassung der Ressource
Cyber Security
- is the application of technologies, processes and controls to protect systems, networks, programs,
devices and data from cyber attacks.
- Key Terms
- The topic of cyber security is sweeping the world by storm with some of the largest and most
advanced companies in the world falling victim to cyber-attacks in just the last 5 years.
- Against that backdrop, highly personal and sensitive
information such as social security numbers were recently
stolen in the Equifax hack, affecting over 145 million people.
- Cyber security's core function is to protect the devices we all
use (smartphones, laptops, tablets and computers), and the
services we access - both online and at work - from theft or
damage. It's also about preventing unauthorised access to
the vast amounts of personal information we store on these
devices, and online.
- Cyber security is important because smartphones, computers and the internet are now such a
fundamental part of modern life, that it's difficult to imagine how we'd function without them. From
online banking and shopping, to email and social media, it's more important than ever to stake steps
that can prevent cyber criminals getting hold of our accounts, data, and devices.
- Attacks
- In computers and computer networks an
attack is any attempt to expose, alter,
disable, destroy, steal or gain
unauthorized access to or make
unauthorized use of an asset.
- Hackers
- someone who seeks out and
exploits these vulnerabilities
- A black hat hacker is someone
who tries to inflict damage by
compromising security systems
- A grey hat hacker is
someone who does it
for fun and not with
malicious intent
- A white hat hacker is
someone who works with
organizations to strengthen
the security of a system
- Types of Threats
- Malware
- Worm
- Worms get around by exploiting vulner
- Types of Malware
- Trojan Horse - Users that are tricked into downloading it to their computer.
Once installed the Trojan works, undercover to carry out a predetermined
task.
- Rootkit - Designed to remotely access and
control a computer system without being
detected by security software or the user.
- Ransomware - Encrypts files stored on a computer
to extort./demand or steal money from
organisations
- Spyware - Is secretly installed
to collect information from
someone else's computer
- Keyloggers - Spyware that records every keystroke
made on a computer to steal personal information
- Social Engineering
- is a set of methods used by
cybercriminals to deceive individuals
into handing over information that
they can use for fraudulent
purposes.
- Shoulder Surfing - It involves the attacker
watching the victim while they provide
sensitive information
- Phishing - is an attack in which the victim
receives an email disguised to look as if it has
come from a reputable source, in order to trick
them into giving up valuable data. The email
usually provides a link to another website where
the information can be inputted.
- Adware - Automatically shows
adverts such as popups. Most
adware is harmless but some
contain spyware such as
keyloggers
- Botnet - ots take control of a computer system, without the
user’s knowledge. A botnet is a large collection of
malware-infected devices (zombies). An attacker (‘bot herder’)
chooses when to ‘wake’ the zombies to perform an attack.