A threat is an incident or an action which is deliberate or
unintended that results in disruption, down time or data loss.
Attack
An attack is a deliberate action, targeting an
organisation’s digital system or data.
Unauthorised Access
This refers to someone gaining entry without permission to an
organisation’s system, software or data. This achieved by exploiting
a security vulnerability
Cyber Security
Refers to the range of measures that can be taken
to protect computer systems, networks and data
from unauthorised access or cyberattack.
Trojan Horse
Users are tricked into downloading it to their
computer. Once installed the Trojan works
undercover to carry out a predetermined task.
Rootkit
Designed to remotely access and control a computer system without being
detected by security software or the user.
Keyloggers
spyware that records every keystroke made on a
computer to steal personal information
Spyware
Is secretly installed to collect information
from someone else's computer
DDoS attack
flooding a website with useless traffic to
inundate and overwhelm the network
Ransomware
Encrypts files stored on a computer to extort/demand or
steal money from organisations.
Adware
Automatically shows adverts such as popups.
Botnet
Bots take control of a computer system,
without the user’s knowledge.
Pharming
is when a victim redirects the user from a genuine
website to a fake one.
Shoulder Surfing/Shouldering
It involves the attacker
watching the victim while they
provide sensitive information
Baiting
Cyber criminals make a promise of goods to get the
information that they need.
Blagging/Pretexting
is an attack in which the perpetrator invents a scenario in
order to convince the victim to give them data or money.
Phishing
is an attack in which the victim receives an email disguised
to look as if it has come from a reputable source, in order
to trick them into giving up valuable data.
Tailgating/Piggybacking
Trying to gain access to a secure
room or building.
Social Engineering
is a set of methods used by cybercriminals to deceive individuals into
handing over information that they can use for fraudulent purposes
Quid Pro Quo
Cyber criminals make a promise of a
service to get the information that they
need.
Hackers
Black hat hackers
Grey hat hackers
White hat hackers
Someone who seeks out and
exploits these vulnerabilities.