A deliberate action, targeting an
organizations digital system or
data
THREAT
An incident or action which
is deliberate or unintended
that results in disruption,
downtime or data loss
EXTERNAL
Caused outside the
organization
INTERNAL
Caused by an
incident inside an
organization
Cyber
Security
The range of
measures that can
be taken to protect
computer systems,
networks, and data
from: unauthorized
access or
cyberattack
UNAUTHORIZED
ACCESS
This refers to someone gaining entry
without permission to an organization’s
system, software or data. This achieved
by exploiting a security vulnerability
HACKER
Is someone who seeks
out and exploits these
vulnerabilities.
Types of
Hackers
White
working with organizations to
strengthen the security of a system
Grey
Do it for fun and not with malicious intent
Black
They try to inflict damage by
compromising security systems
WHY ARE SYSTEMS ATTACKED?
Personal
Attack
Friends / family may
attack each other if
upset over something
Employees that are
unhappy may attack the
company
Information/Data
Theft
Company information
may also be stolen
Credit card and
financial details are
stolen to gain money
Disruption
Attacks such as
Denial-of-Service stop
websites working
Viruses can slow
down computers and
delete files
Industrial
Espionage
The aim is to find intellectual property such
as designs or blueprints for products,
business strategies or software source
code
Fun/Challenge
Friends may give respect
of hacking achievements
There is a sense
of achievement
Hacking systems can be fun
or a challenge
Finacial Gain
Ransoms can be made to
prevent attacks from
happening
Ransomware can be used to
encrypt a computer until you pay
A payment is given to
carry out an attack on a
organization
MaLWare (Malicious software)
This is an umbrella term
given to software that is
designed to harm a digital
system, damage data or
harvest sensitive
information.
VIRUS
A piece of malicious code that attaches to
a legitimate program. It is capable of
reproducing itself and usually capable of
causing great harm to files or other
programs on the same computer
WORM
Similar to virus but unlike a virus it is a self
contained program. It is capable of
spreading on it own, without help from
humans. Worms get around by exploiting
vulnerabilities in operating systems and
attaching themselves to emails. They self
replicate at a tremendous rate, using up
hard drive space and bandwidth, overloading
servers.
Trojan Horse
A type of malware that is often disguised as
legitimate software. Users are tricked into
downloading it to their computer. Once installed
the Trojan works undercover to carry out a
predetermined task. Such as Backdoor for
hackers to use, Installing harmful programs,
Harvesting sensitive data. It is named after the
wooden horse used by the ancient Greeks to
infiltrate the city of Troy.
RootKit
A set of tools that give a hacker a high level administrative
control, of a computer. They can then us this privileged
position to: Encrypt files Install programs Change system
configuration Steal data Much like a trojan, rootkits often
come bundled with legitimate software.
Keyloggers
spyware that records every
keystroke made on a computer to
steal personal information
Ransomware
Encrypts files stored on a computer to extort
or steal money from organisations. Victims
must then pay a ransom to have the
encrypted files unlocked. There is normally a
deadline for the transaction to happen. Bitcoin
is usually asked for as a form of payment as
they are difficult to trace. If the payment is
not made then the amount demanded may
increase or the files are permanently locked.
Ransomware is usually spread through e-mails
or through infected websites.
Spyware
malicious software secretly installed to collect information from someone else's
computer Cyber criminals harvest personal information such as: Passwords
Credit card numbers and other details Email addresses With this information
they can steal someone's identity, making purchases on their credit card etc
Spyware works in the background on someones computer without it being
noticed.
Social Engineering
Involves tricking people into divulging valuable information
about themselves. Such as Passwords PIN numbers
Credit card details
Phishing
A way of attempting to acquire information, by
pretending to be from a trustworthy source.
examples are email spoofing, fake websites,
spoof phone calls
Spear Phishing
Involves bespoke emails being sent to well-researched victims.
eg. where somebody who holds a senior position within an
organisation with access to highly valuable information uses it to
target victims
Man in the middle attack
A form of eavesdropping where the attacker
makes an independent connection between
two victims and steals information to use
fraudulently.
Blagging
A blagger invents a scenario to engage a targeted victim in a
manner that increases the chance the victim will divulge
information. For example a blagger might pretend to be a
member of the IT department to inform them something is
wrong with your PC and requires access to fix the problem
Pharming
Involves redirecting people to bogus, look-a -like
websites without realising it has happened. The
objective is to acquire sensitive personal
information or to install malware
Shoulder Surfing
Acquiring sensitive information by someone peering
over a users shoulder when they are using a device. It
can also be done from a distance with the use of
technology such as video cameras, drones etc