An attack is a deliberate action,
targeting an organisation’s digital
system or data.
Cyber Security
refers to the range of measures that can be taken to protect
computer systems, networks and data from unauthorised
access or cyberattack.
Unauthorised Access
This refers to someone gaining entry without permission to an
organisation’s system, software or data.
threat
Internal Threat
caused by an incident
inside an organisation
External Threat
caused outside the
organisation
A threat is an incident or an action which is deliberate or
unintended that results in disruption, down time or data loss.
hackers
BLACK HAT HACKER
is someone who tries to inflict damage by
compromising security systems
GREY HAT HACKER
is someone who does it for fun
and not with malicious intent
is someone who seeks out
and exploits these
vulnerabilities.
WHITE HAT HACKER
is someone who works with
organizations to strengthen the
security of a system
Types of Threat
Malicious Software
This is an umbrella term given to software that is designed to
harm a digital system, damage data or harvest sensitive
information.
Virus
A piece of malicious code that attaches to a legitimate
program. It is capable of reproducing itself and usually
capable of causing great harm to files or other programs on
the same computer
worms
Worms get around by exploiting
vulnerabilities in operating systems and
attaching themselves to emails.
They self replicate at a tremendous rate, using up hard drive space and
bandwidth, overloading servers.
Trojan Horse
Users are tricked into downloading it to their computer. Once
installed the Trojan works undercover to carry out a
predetermined task.
Rootkit
Designed to remotely access and control a computer system without being
detected by security software or the user.
Ransomware
Encrypts files stored on a computer to extort/demand or steal
money from organisations.
Spyware
Is secretly installed to collect information from
someone else's computer
Keyloggers
spyware that records every keystroke made on a computer to steal
personal information
Adware
Automatically shows adverts such as popups. Most
adware is harmless but some contain spyware such
as keyloggers
flooding a website with useless traffic to inundate and
overwhelm the network
Social Engineering
is a set of methods used by
cybercriminals to deceive individuals
into handing over information that
they can use for fraudulent purposes
Shoulder
Surfing/Shouldering
It involves the attacker watching the victim while
they provide sensitive information
Phishing
is an attack in which the victim receives an email
disguised to look as if it has come from a reputable
source, in order to trick them into giving up valuable
data. The email usually provides a link to another
website where the information can be inputted.
Pharming
is when a victim redirects the user
from a genuine website to a fake
one.
Blagging/Pretexting
is an attack in which the perpetrator invents a scenario in order
to convince the victim to give them data or money.
Tailgating/Piggybacking
Trying to gain access to a
secure room or building.
Baiting
Cyber criminals make a promise of goods to get
the information that they need.
Quid Pro Quo
Cyber criminals make a promise of a service
to get the information that they need.