Refers to the range of measures that
can be taken to protect computer
systems. networks and data from
unarthorised access or cyber attack.
THREAT
A threat is an incident or an action
which is deliberate or unintended
that results in distribution, down
time or data loss.
INTERNAL THREAT
Caused by an
incident inside
an organisation
EXTERNAL THREAT
Caused outside the
organisation
ATTACK
An attack is a
deliberate action,
targeting an
organisation's
digital system or
data
UNARTHORISED ACCESS
This refers to someone
gaining entry without
permission to an
organisation's system,
software or data
HACKER
Is someone who seeks
out and exploits these
vulnerabilities
3 TYPES OF HACKERS
Black
They try to inflict
damage by
compromising security
systems
Grey
Do it for fun and
not with malicious
intent
White
Working with
organisation's to
strengthen the security of
a system
This is achieved by
exploiting a security
vulnerability
WHY ARE SYSTEMS ATTACKED
FUN/CHALLENGE
Hacking systems can be fun or a
challenge
There is a sense of
achievement
Friends may give respect of hacking
achievements
FINANCIAL GAIN
Ransoms can be made to prevent
attacks from happening
Ransomware can be used to encrypt
a computer until you pay
A payment is given to carry
out an attack on an
organization
DISTRIBUTION
Attacks such as denial of service
stop websites from working
Viruses can slow down computers
and delete files
INDUSTRIAL ESPIONAGE
The aim is to find intellectual property such
as design or blueprints for products, business
strategies or software source code
PERSONAL ATTACK
Employees that are unhappy may
attack the company
Friends/family mat attack each other if
upset over something
INFORMATION/DATA THEFT
Credit card or financial details are
stolen to gain money
Company information may also be stolen
MALWARE
MALICIOUS
SOFTWARE
This is an umbrella term given to
software that is designed to harm a
digital system, damage data or
harvest sensitive information.
VIRUS
A piece of malicious code that attaches to a
legitimate program. It is capable of
reproducing itself and usually capable of
causing great harm to files or other programs
on the same computer
WORM
Similar to virus but unlike a virus it is a self contained program. It is capable of spreading
on it own, without help from humans. Worms get around by exploiting vulnerabilities in
operating systems and attaching themselves to emails. They self replicate at a
tremendous rate, using up hard drive space and bandwidth, overloading servers.
TROJAN HORSE
A type of malware that is often disguised as legitimate software. Users
are tricked into downloading it to their computer. Once installed the
Trojan works undercover to carry out a predetermined task. Such as
Backdoor for hackers to use Installing harmful programs Harvesting
sensitive data It is named after the wooden horse used by the ancient
Greeks to infiltrate the city of Troy.
ROOTKIT
Is a set of tools that give a hacker a high level
administrative control, of a computer. They can
then us this privileged position to: Encrypt files
Install programs Change system configuration
Steal data Much like a trojan, rootkits often
come bundled with legitimate software.
RANSOMEWARE
Encrypts files stored on a computer to extort or steal money from organisations.
Victims must then pay a ransom to have the encrypted files unlocked. There is
normally a deadline for the transaction to happen. Bitcoin is usually asked for as
a form of payment as they are difficult to trace. If the payment is not made then
the amount demanded may increase or the files are permanently locked.
Ransomware is usually spread through e-mails or through infected websites.
SPYWARE
malicious software secretly installed to collect information from
someone else's computer Cyber criminals harvest personal
information such as: Passwords Credit card numbers and other
details Email addresses With this information they can steal
someone's identity, making purchases on their credit card etc
Spyware works in the background on someones computer without
it being noticed.
KEYLOGGERS
spyware that records every
keystroke made on a computer
to steal personal information
BOTNET
An army of 'zombie' devices. They are used to carry out
mass attacks such as emailing spam to millions of users.
DISTRIBUTED
DENIAL-OF-SERVICE ATTACK
Flooding a website with useless traffic to inundate and
overwhelm the network
SOCIAL ENGINEERING
PHISHING
A way of attempting to acquire
information, by pretending to be from a
trustworthy source. examples are email
spoofing, fake websites, spoof phone calls
SPEAR PHISHING
Involves bespoke emails being sent to
well-researched victims. eg. where somebody who
holds a senior position within an organisation with
access to highly valuable information uses it to
target victims
BLAGGING
A blagger invents a scenario to
engage a targeted victim in a
manner that increases the chance
the victim will divulge information
SHOULDER SURFING
Acquiring sensitive information by someone peering
over a users shoulder when they are using a device. It
can also be done from a distance with the use of
technology such as video cameras, drones etc
PHARMING
Involves re directing people to bogus, look-a -like websites without realising it has happened.
MAN IN THE MIDDLE ATTACK
A form of eavesdropping where
the attacker makes an
independent connection between
two victims and steals information
to use fraudulently.