Zusammenfassung der Ressource
cyber sicurity
- key terms
- threat
- A threat is an incident or an
action which is deliberate or
unintended that results in
disruption, down time or data
loss. Internal Threat = caused by
an incident inside an organisation
External Threat = caused outside
the organisation
- attack
- An attack is
a deliberate
action,
targeting an
organisation’s
digital
system
or
data.
- unortharised accsess
- This refers to someone gaining entry without
permission to an organisation’s system, software or
data. This achieved by exploiting a security
vulnerability
- refers to the range of measures that can
be taken to protect computer systems,
networks and data from unauthorised
access or cyberattack.
- hackers
- s someone who seeks out and exploits these vulnerabilities.
- black hat hacker
- is someone who tries to inflict damage by compromising
security systems
- is someone who does it for fun and not with malicious intent
- white hat hacker
- is someone who works with organizations to strengthen the security of a system
- gray hat hacker
- malware
- trojon horse
- Users are tricked into downloading it to their computer. Once
installed the Trojan works undercover to carry out a
predetermined task.
- rootkik
- Designed to remotely
access and control a
computer system without
being detected by security
software or the user.
- ransomware
- Encrypts files stored on a
computer to extort/demand
or steal money from
organisations.
- spyware
- s
secretly
installed
to
collect
information
from
someone
else's
computer
- keyloggers
- pyware that records every keystroke made on a computer to steal personal information
- adware
- Automatically shows adverts such as popups. Most adware
is harmless but some contain spyware such as keyloggers
- malaweare
- virua
- A piece of malicious code that attaches to a legitimate program. It is
capable of reproducing itself and usually capable of causing great
harm to files or other programs on the same computer
- worm
- Worms get around by exploiting vulnerabilities in operating systems
and attaching themselves to emails. They self replicate at a
tremendous rate, using up hard drive space and bandwidth,
overloading servers.