Gaining entry to an organisation's
system, software, without permission
to. This is achieved through
exploiting a security vulnerability.
Cyber
Security
A range of measures taken to protect
computer systems, networks and data
from unauthorised access or
cyberattacks
Threat
An incident or action which is deliberate,
which results in disruption, downtime or
data loss.
External Threat
Caused outside the
organisation
Internal Threat
Caused by an incident
inside of an organisation
Attack
A deliberate action, targeting an
organisation's digital system or
data
HACKERS
Someone who seeks out and
exploits these vulnerability
Black Hat
Hacker
Someone who tries to inflict
damage by compromising
security systems
Grey Hat
Hacker
Someone who does it for
fun and not with malicious
intent
White Hat
Hacker
Someone who works with
organisations to strengthen
the security of a system
TYPES OF
THREATS
Malware
Malicious software. This is
an umbrella term given to
software which is designed
to harm a digital system,
damage data or harvest
sensitive information
Virus
A piece of malicious code that attaches
to a legitimate program. It is capable of
reproducing itself and usually capable
of causing great harm to files or other
programs on the same computer
Worm
Worms get around by exploiting
vulnerabilities in operating
systems and attaching
themselves to emails. They self
replicate at a tremendous rate,
using up hard drive space and
bandwidth, overloading servers.
Trojan Horse
Users are tricked into
downloading it to their
computers. Once
installed the Trojan works
undercover to carry out a
predetermined task.
Rootkit
Designed to remotely access
and control a computer
system without being
detected by security
software of the user.
Ransomware
Encrypts files stored on a
computer to extort/demand or
steal money from
organisations.
Spyware
Is secretly installed to collect
information from someone else's
computer.
Keyloggers
Spyware that records every
keystroke made on a
computer to steal personal
information.
Adware
Automatically shows adverts such as
popups. Most adware is harmless but
some contain spyware such as
keyloggers.
Flooding a website with useless
traffic to inundate and overwhelm
the network.
Botnet
Bots take control of computer systems , without users
knowledge. A botnet is a large collection of
malware-infected devices(zombies). An attacker (bot
herder)chooses when to 'wake' the zombies to perform
an attack.
Social Engineering
Is a set of methods used by
cybercrimminals to decieve individuals
into handing over information that they
can use for fraudulent purposes.
Shoulder surfing/shouldering
Involves the attacker
watching a victim while they
provide sensitive information.
Phishing
Is an attack in which a victim recieves an email disguised to
look as if it has come from a ruptable source,in order to
trick them into giving valuable data.
This email usually provides a link to
another website where the information
can be imputted.
Pharming
Is when a victim redirects the user
from a genuine website to a fake
one.
Some phrming sites are so expertly copied
from the genuine website that it is very
difficult to identify therefore this is carried
out without the user knowing about it.
Blagging/Pretexting
Is an attack in which the perpetrator invents a
scenario in order to convince the victim to give
them data or money.
Tailgating/ piggybacking
Trying to gain access to a secure
room or building.
Baiting
Cyber crimminals make a promise of goods to get
information that they need.
Quid pro quo
cyber crimminals make a promise of service to get
information they need.