an attack is a deliberate
action targeting an
organisation's digital system
or data
threats
A threat is an incident or an action which is
deliberate or unintended that results in the
distribution,down time or loss of data
Internal threat:
caused by an
incident inside
an organisation
External threat:
caused outside
the organisation
cyber security
refers to the range of
measures that can be taken
to protect computer
systems, networks and data
from unauthorised access
or cyber attack
unauthorised access
this refers to
someone
gaining entry
without
permission to
an
organisation's
system,
software or
data
achieved by
exploiting a
security
vulnerability
hacker
someone who seeks out and
exploits these vulnerabilities
black hat
hacker
someone
who tries to
inflict
damage by
compromising
security
system
grey hat hacker
someone who does it
for fun and not with
malicious intent
white hat hacker
someone who works
with organisations to
strengthen the security
of a system
types of threats
malware
malicious soft ware
this is an umbrella
term given to
software that is
designed to harm a
digital
system,damage data
or harvest sensitive
information
virus
a piece of malicious code that attaches to a
legitimate program. it is capable of reproducing
itself and usually capable of causing great harm
to files or other programs on the same computer
worm
they get around by exploiting
vulnerabilities in operating
systems and attaching
themselves to emails. they self
replicate at a tremendous rate,
using up hard drive space and
bandwidth, overloading servers
trojan Horse
users are tricked into downloading it to
their computer,once installed it works
undercover to carry out a predetermined
task.
rootkit
designed to remotely access
and control a computer system
without being detected by
security software or the user.
ransomware
encrypts files stored on a
computer to
extort/demand or steal
money from
organisations
spyware
is secretly installed to collect
information form someone
else's computer
keyloggers
spyware that records every
keystroke made on a
computer to steal personal
information
adware
automatically shows adverts such as popups
most adware is harmless but some
contain spyware such as keyloggers
botnet
take control of computer systems
, without the user's knowledge.
a botnet is a large collection of
malware-infected devices
(zombies)
an attacker ('bot
herder') chooses
when to 'wake'
the zombies to
perform an
attacker
ddos
flooding a website with
useless traffic to inundate
and overwhelm the
network
social engineering
is a set of methods used by
cybercriminals to deceive
individuals into handing
over information that they
can use for fraudlent
purposes
shoulder
surfing/shouldering
it involves the
attacker watching
the victim while they
provide sensitive
information
phising
an attack in which the
victim receives an email
disguised to look as if it
has come from a
reputable source, in
order to trick them into
giving up valuable data.
the email usually
provides a link to
another website where
the information can be
inputted
pharming
is when a victim
redirects the
user from a
genuine website
to a fake one
some pharming sites are so expertly copied
from the genuine website that it is very
difficult to identify therefore this is carried
out without the user knowing about it
blagging/pretexting
is an attack in which the
perpetrator invents a scenario in
order to convince the victim to
give them data or money
tailgating/piggybacking
trying to gain access
to a secure room or
building
bating
cyber criminals make a
promise of goods to get
their information that
they need
quid pro qou
cyber criminals make a promise of
a service to get the information
that they need