is a deliberate action, targeting an
organisation’s digital system or data
Threat
Internal
caused by an incident
inside an organisation
External
caused outside the
organisation
is an incident or an action which is
deliberate or unintended that results in
disruption, down time or data loss
Cyber Security
refers to the range of measures that can
be taken to protect computer systems,
networks and data from unauthorised
access or cyber attack
Unauthorised Access
refers to someone gaining entry without
permission to an organisation’s system,
software or data
can be achieved by exploiting a
security vulnerability
Hackers
is someone who seeks out and exploits
these vulnerabilities
Black Hat Hacker
is someone who tries to inflict
damage by compromising
security systems
White Hat Hacker
is someone who works with organisations
to strengthen the security of a system
Grey Hat Hacker
is someone who does it for fun
and not with malicious intent
Types Of Threats
Mallware
Malicious Software
is an umbrella term given to software
that is designed to harm a digital
system, damage data or harvest
sensitive information
Virus
is a piece of malicious code that
attaches to a legitimate program. It is
capable of reproducing itself and
usually capable of causing great harm
to files or other programs on the same
computer
Worm
get around by exploiting vulnerabilities in operating
systems and attaching themselves to emails
self replicate at a tremendous rate, using up hard drive
space and bandwidth, overloading servers
Trojan Horse
users are tricked into downloading it to their
computer, once installed the Trojan works
undercover to carry out a predetermined task
Trojan Horse
users are tricked into downloading it to their
computer, once installed the Trojan works
undercover to carry out a predetermined task
Rootkit
designed to remotely access and control
a computer system without being
detected by security software or the user
Ransomware
encrypts files stored on a computer to
extort/demand or steal money from
organisations
Spyware
is secretly installed to collect information from
someone else's computer
Keyloggers
spyware that records every keystroke made on a
computer to steal personal information
Adware
automatically shows adverts such as popups, most
adware is harmless but some contain spyware
such as keyloggers
Botnet
bots take control of a computer system, without the
user’s knowledge, a botnet is a large collection of
malware-infected devices (zombies), an attacker (‘bot
herder’) chooses when to ‘wake’ the zombies to
perform an attack
DDOS Attack
this stands for distrebuted denial of service attack and it
involves flooding a website with useless traffic to
inundate and overwhelm the network
Social Engineering
is a set of methods used by cybercriminals to deceive
individuals into handing over information that they can use
for fraudulent purposes
Shoulder Surfing/Shouldering
It involves the attacker watching the victim
while they provide sensitive information
Phishing
is an attack in which the victim receives an email disguised to
look as if it has come from a reputable source, in order to trick
them into giving up valuable data. The email usually provides a
link to another website where the information can be inputted
Pharming
is when a victim redirects the user from a genuine
website to a fake one. Some pharming sites are so
expertly copied from the genuine website that it is
very difficult to identity therefore this is carried out
without the user knowing about it
Blagging/Pretexting
is an attack in which the perpetrator invents a scenario in order
to convince the victim to give them data or money
Tailgating /
Piggybacking
trying to gain access to a
secure room or building
Baiting
cyber criminals make a
promise of goods to get the
information that they need
Quid Pro Quo
cyber criminals make a
promise of a service to get the
information that they need