pecifically designed
to disrupt,
damage, or gain
unauthorized
access to a
computer system.
Trojan Horse:
Rootkit
Ransomware:
Encrypts files stored on a computer to extort/demand or steal money from organisations.
spyware
Is secretly installed to collect information from someone else's computer
keyloggers
spyware that records every
keystroke made on a computer
to steal personal information
social enjenering
Shoulder Surfing/Shouldering
It involves the attacker
watching the victim while they
provide sensitive information
Phishing
is an attack in which the victim receives an
email disguised to look as if it has come from a
reputable source, in order to trick them into
giving up valuable data. The email usually
provides a link to another website where the
information can be inputted.
Pharming
s when a victim redirects
the user from a genuine
website to a fake one.
Blagging/Pretexting
is an attack in which the
perpetrator invents a scenario in
order to convince the victim to
give them data or money.
Tailgating/Piggybacking
Trying to gain access to a secure room or building.
Baiting
Cyber criminals make a promise of goods to get the information that they need.