Zusammenfassung der Ressource
cyber security
- key terms
- cyber security
- refers to the range of measures that can be taken to
protect computer systems, networks and data from
unauthorised access or cyberattack.
- threat
- Internal Threat = caused by an incident inside an
organisation
- External Threat = caused outside
the organisation
- A threat is an incident or an action which is
deliberate or unintended that results in disruption,
down time or data loss.
- attack
- An attack is a deliberate action, targeting an
organisation’s digital system or data.
- Unauthorised Access
- This refers to someone gaining entry without permission to an
organisation’s system, software or data. This achieved by exploiting a
security vulnerability
- types of threat
- Trojan Horse:
- Users are tricked into downloading it to their
computer. Once installed the Trojan works
undercover to carry out a predetermined task.
- Rootkit:
- Designed to remotely access and control a computer
system without being detected by security software or
the user.
- Ransomware
- Encrypts files stored on a computer to
extort/demand or steal money from organisations.
- Spyware:
- Is secretly installed to collect information from
someone else's computer
- Keyloggers:
- spyware that records every keystroke made on a computer to
steal personal information
- Adware:
- Automatically shows adverts such as popups.
Most adware is harmless but some contain
spyware such as keyloggers
- Botnet
- Bots take control of a computer system, without the user’s
knowledge. A botnet is a large collection of
malware-infected devices (zombies).
- An attacker (‘bot herder’) chooses when to ‘wake’ the
zombies to perform an attack.
- Distributed Denial-of-Service attack
(DDoS attack)
- flooding a website with useless traffic to
inundate and overwhelm the network
- Hackers
- a hacker is someone who seeks out and exploits these
vulnerabilities.
- black hat hacker
- is someone who tries to inflict damage by compromising
security systems
- GREY HAT HACKER:
- is someone who does it for fun and not with
malicious intent
- WHITE HAT HACKER:
- is someone who works with organizations to
strengthen the security of a system
- social
engineering
- is a set of methods used by cybercriminals to deceive individuals
into handing over information that they can use for fraudulent
purposes
- Shoulder Surfing/Shouldering
- It involves the attacker watching the victim while
they provide sensitive information
- Phishing
- is an attack in which the victim receives an
email disguised to look as if it has come from a
reputable source, in order to trick them into
giving up valuable data. The email usually
provides a link to another website where the
information can be inputted.
- Pharming
- is when a victim redirects the user from a genuine
website to a fake one.
- Blagging/Pretexting
- is an attack in which the perpetrator invents a
scenario in order to convince the victim to give
them data or money.
- Blagging and Pretexting does not just happen by email
but on the phone too
- Tailgating/Piggybacking
- Trying to gain access to a secure room or building.
- Baiting
- Cyber criminals make a promise of
goods to get the information that
they need.
- Quid Pro Quo
- Cyber criminals make a promise of a
service to get the information that they
need.