an attack is a deliberate action, targeting
an organisation's digital system or data
Threat
a threat is an icident or an action which is a
deliberate or unintended that results in
disruption, down time or data loss
External
caused outside the
organisation
Internal
caused by an incident
inside an organisation
Cyber Security
refers to the range of measures that
can be taken to protect computer
systems, networks and date from
unauthorised access or cyberattack
Unauthorised Access
this refers to someone gaining entry
without permission to an organisation's
system, software, or data. This is achieved
by exploiting a security vulnerability
Hackers
Black Hat Hacker
is someone who tries to inflict damage by
compromising securiy systems
Hacker
is someone who seeks out and
exploits these vulnerabilities
Grey Hat Hacker
is someone who does it for fun and not
with malicious intent
White Hat Hacker
is someone who works with organizations
to strengthen the security of a system
Types of Threats
MALWARE
Malicious Sofftware. This is an umbrella term given
to software that is designed to harm a digital
system, damage data or harvest sensitive
information.
Worm
Worms get around by exploiting vulnerabilities
in operating systems and attaching themselves
to emails. They self replicate at tremendous
rate, usuing up hard drive space and
bandwidth, overloading servers.
Virus
a piece of malicious code that attaches to a
legitimate program. It is capable of reproducing
itself and usually capable of causing great harm
to files or other programs on the same computer
Trojan Horse
Users are tricked into downloading it to their
computer. Once installed the Trojan works
undercover to carry out a predetermined task
Rootkit
Designed to remotely access and control a computer
system without being detected by security software or
the user
Ransomware
Encrypts files stored on a computer to
extort/demand or steal money from
organisations
Spyware
Is secretly installed to collect
information from someone
else's computer
Keyloggers
Spyware that records every keystroke
made on a computer to steal personal
information
Adware
Automatically shows adverts such as
popups. Most adware is harmless but
some contain spyware such as
keyloggers
Botnet
Bots take control of a computer system, without the
user's knowledge. A botnet is a large collection of
malware-infected devices (zombies). An attacker ('bot
herder') chooses when to 'wake' the zombies to perform
an attack
flooding a website with useless traffic to inundate
and overwhelm the network
Social Engineering
is a set of methods used by cybercriminals to deceive
individuals into handing over information that they
can use for fraudulent purposes
shoulder
surfing/shouldering
it involves the attacker watching the
victim while they provide sensitive
information (E.g. Watching someone put
in their pin at a cash point)
Phishing
is an attack in which the victim receives an email
disguised to look as if it has come from a reputable
source, in order to trick them into giving up valuable
data. The email usually provides a link to another
website where the information can be inputted
Pharming
is when a victim redirects the user from a genuine website to a fake
one (Some pharming sites are so expertly copied from the genuine
website that it is very difficult to identity therefore this is carried out
without the user knowing about it )
Blagging/Pretexting
is an attack in which the perpetrator invents a
scenario in order to convince the victim to give them
data or money
Tailgating/piggybacking
Trying to gain access to a secure room or building. E.g. a common type
of this taking place is pretending to be a delivery driver and asking an
authorised person to hold the door so they can enter the building
Baiting
Cyber criminals make a promise of goods to get the
information that they need. Eg. promise free downloads to a
film for login details
Quid Pro Quo
Cyber criminals make a promise of a service to get
the information that they need.