Cybersecurity Threats: Introduction and Prevention

Summary

This document provides an introduction to cybersecurity threats and common types including data breaches, malware, phishing, and ransomware. It also presents basic methods for protecting against these threats.

Full Transcript

Introduction to Cybersecurity Threats A Cyberthreat refers to any potential malicious activity or attack that seeks to damage data, steal data, or disrupt digital operations or information systems Types of Cyber Threats 1 Data Breach 2 Removable...

Introduction to Cybersecurity Threats A Cyberthreat refers to any potential malicious activity or attack that seeks to damage data, steal data, or disrupt digital operations or information systems Types of Cyber Threats 1 Data Breach 2 Removable Media Leak or spill of sensitive, protected, or confidential data Such as thumb drives, CDs, DVDs, and external hard drives from a secure to an insecure environment that are then can be easily stolen corrupted devices can be intentionally copied, transmitted, viewed, stolen, or used in an or unwittingly connected to computers - Once opened, files unauthorized manner from the device can then infect the computer with malware Example : confidential information, such as students’ records that may be inappropriately viewed or used 3 Unpatched Software Vulnerabilities Occur when unpatched or outdated software has not been updated to include the latest software updates - unauthorized users can gain access to information networks and systems Types of Cyber Threats Malware and Viruses Social Engineering Attacks These are malicious programs designed to disrupt These attacks exploit human psychology to gain access to computer systems and steal data. systems or information. Phishing and Ransomware Distributed Denial of Service (DDoS) Attacks Phishing aims to steal credentials, while ransomware These attacks overwhelm systems with traffic, making encrypts data and demands payment for its release. them inaccessible to legitimate users. Insider Threats and Data Breaches Negligence Employees may accidentally expose sensitive information or neglect security protocols. Malicious Intent Employees may intentionally steal or leak data for personal gain or sabotage. Compromised Accounts Employee accounts may be compromised, allowing attackers to access sensitive data. Social Engineering Attacks Pretexting 1 Attackers create a believable scenario to gain information or access. Baiting Attackers offer something desirable, like free software or 2 discounts, to trick victims into clicking a malicious link or downloading malware. Phishing 3 Attackers use deceptive emails, websites, or messages to trick victims into revealing sensitive information. Malware and Viruses Types Impact Malware encompasses various threats, including viruses, Malware can cause significant damage to systems and data, worms, trojans, spyware, and adware. leading to data breaches, system crashes, financial losses, and productivity disruptions. Viruses spread by attaching themselves to executable files, while worms replicate independently and can spread across It can steal sensitive information, such as passwords, financial networks. details, and personal data, which can be used for identity theft or other malicious purposes. Trojans disguise themselves as legitimate software but carry malicious payloads, spyware secretly monitors user activities, and adware displays unwanted advertisements. Phishing and Ransomware Threat Description Impact Phishing Deceptive emails, Identity theft, websites, or financial fraud, data messages aiming to breaches. steal credentials. Ransomware Malware that Data loss, financial encrypts data and losses, business demands payment disruptions. for its release. Distributed Denial of Service (DDoS) Attacks 1 Attacker A botnet of compromised computers is used to flood the target with traffic. 2 Target Server The target server becomes overwhelmed and unable to respond to legitimate users. 3 Impact Service disruptions, website downtime, financial losses. Protecting Against Cybersecurity Threats Strong Passwords Security Software Use complex passwords and Install antivirus and anti-malware avoid reusing them across software to detect and remove different accounts. threats. Regular Updates Employee Training Keep operating systems and Educate employees about software up to date with the cybersecurity threats and best latest security patches. practices to protect sensitive information.

Use Quizgecko on...
Browser
Browser