A threat is an incident or an action which is deliberate or unintended that results in disruption, down
time or data loss.
attack
An attack is a deliberate action, targeting an organisation’s digital system or
data.
unauthorised access
This refers to someone gaining entry without permission to an organisation’s system, software or
data. This achieved by exploiting a security vulnerability
hackers
is someone who seeks out and exploits these vulnerabilities.
black hat hackers
is someone who tries to inflict damage by compromising security systems
GREY HAT HACKER
is someone who does it for fun and not with malicious intent
WHITE HAT HACKER
is someone who works with organizations to strengthen the security of a system
malware
Trojan Horse
Users are tricked into downloading it to their computer. Once installed the Trojan works undercover
to carry out a predetermined task.
Rootkit
Designed to remotely access and control a computer system without being detected by security
software or the user.
Ransomware
Encrypts files stored on a computer to extort/demand or steal money from organisations.
Spyware
Is secretly installed to collect information from someone else's computer
Keyloggers
spyware that records every keystroke made on a computer to steal personal information
Adware
Automatically shows adverts such as popups.
social engineering
is a set of methods used by cybercriminals to deceive individuals into handing over information that
they can use for fraudulent purposes
Shoulder Surfing/Shouldering
It involves the attacker watching the victim while they provide sensitive information
Phishing
is an attack in which the victim receives an email disguised to look as if it has come from a reputable
source
Pharming
is when a victim redirects the user from a genuine website to a fake one.
Blagging
is an attack in which the perpetrator invents a scenario in order to convince the victim to give them
data or money.
Tailgating
Trying to gain access to a secure room or building.
Baiting
Cyber criminals make a promise of goods to get the information that they need.
Quid Pro Quo
Cyber criminals make a promise of a service to get the information that they need.