A Threat is an action which is
deliberated that results in
disruption, down time and/or
data loss
Internal Threat
can be caused by an
incident inside an
organisation
External Threat
can be caused outside
of the organisation
Attack
An attack is a deliberate action,
targeting an organisation's
digital systems and/or data
Unauthorised Access
Unaurthorised access refers to
someone getting/gaining entry
without permission to an
organisations system, software
and/or data
This is achieved by exploiting a
security's vunerability
Cyber Security
Cyber Security is a range
of measures that can be
taken to protect a
computer and its
systems, network and
data from cyberattacks
and unorthorised access
Hackers
Hacker
A Hacker is someone who
seeks out to exploit these
vunerabilities
Black Hat Hacker
A Black Hat Hacker is
someone who tries to inflict
damage by compromising
security systems
Grey Hat Hacker
A Grey Hat Hacker is someone who
does it for fun and doesn't do it with
malicious intent
White Hat Hacker
A White Hat Hacker is someone
who works with organisations
to strengthen the security of
their systems
Types Of Threats
Malware
Virus
This is a piece of malicious code that attaches
to a legitimate program. it's capable of
reproducing itself and usually capable of
causing great harm to data and/or other
program files in the computer
Worm
Worms get around data by
exploiting vunerabilities in
operationg systems and
attaching themselves to emails
Worms self replicate at a
tremedous rate, using up hard
drive/ SSD space and bandwidth,
overloading servers
Malicious Software
This is an umbrella term given to a
software that is designed to harm a
digital system, damage data and/or
harvest sensitive information
Rookit
This is designed to remotley
access and control a computer
system without being detected by
security software or the user of
the computer
Spyware
Spyware is secretly installed
to collect information from
someone else's computer
Keyloggers
This is spyware that tecords every keystroke
made on a computer to steal personal
information such as passwords for bank cards and
other things like this
Adware
Adware automatically shows adverts such as
popups, mostadware is harmless but can
contain spyware suck as keyloggers
Botnet
These are bots that
take control of a
computer without
the user realizing
A botnet is a large
collection of
malware-infected devise
(zombies)
An attacker (bot herder) chooses when
to wake the zombies to perform an
attack
DDoS Attack
Commenly known as Distributed
Denial-of-Service attack
This floods a website with usless traffic
to inundate and overwhelm the network
Trojan Horse
this piece of sofware tricks users
into downloading it to their
computer. once it's installed the
trojan horse works undercover to
carry out a predetermind task
Ransomeware
Ransomeware encrypts files stored on a
computers hard drive/ ssd to extort/
demand or steal money from other
organisations
Social Engeneering
Shoulder Surfing/ Shouldering
This envolves the attacher watching
the victim while they provide
sensitive information
Phishing
This is an attach in which the victim
recieves an email disguised to look as
it has come from a reputable source. In
order to trick them into giving up
valuable data.
This email would usually
provide a link to another where
the information can be inputted
Pharming
Is when a victim redirects the
user from a genuin website to a
fake website
Some Phariming techniques are when the page is
coppied so it looks genuin but in fact is a fake and
is very hard to identify, this means the user may
not acknolage it
Blaggin/ Pretexting
This is an attack in which the perperator
invents a scenario in order to convince the
victim to give them data or money
Tailgating/ piggybacking
This is trying to gain access to
a secure room or building
Baiting
Cyber criminals make a promise
of goods to get the information
that they need
Quid Pro Qou
Cyber criminals make a
promise of a service to get
the information that they
need