Cyber Security Term 2 PDF
Document Details
Uploaded by CapableTsavorite
Curro Rivonia
Tags
Summary
This document provides an overview of cyber security, outlining key concepts like cyber threats, cyber attacks, and cybersecurity categories. It also discusses various types of cyber threats, like phishing, ransomware, and spyware.
Full Transcript
2023/04/11 CYBER SECURITY TERM 2 1 OUTCOMES Im...
2023/04/11 CYBER SECURITY TERM 2 1 OUTCOMES Important terms Cyber security, cyber attacks, cyber threats, cyber space Cyber threats Types of cyber threats Safeguarding Cyber Defence for Individuals 2 1 2023/04/11 WHAT IS… Cyber Security Cyber Attacks Cyber security is the practice of An attempt by hackers to damage or defending computers, servers, mobile destroy a computer network or system. devices, electronic systems, networks, An active offensive action where a bad and data from malicious attacks. actor is attempting to compromise a system Cyber Threats Cyber Space An attack that is mounted against our A virtual space that doesn’t exist, has digital devices by means of cyberspace become the metaphor to help us A probability that a specific type of understand digital weaponry that attack may occur. intends to harm us. 3 Cyber threads An attack that is mounted against our digital devices by means of cyberspace A probability that a specific type of attack may occur. 4 2 2023/04/11 CATAGORIES Cybersecurity threats come in three broad categories of intent. financial gain disruption espionage corporate espionage Virtually every cyber threat falls into one of these three modes. In terms of attack techniques, malicious actors have an abundance of options. 5 Types of Cybersecurity Threats Phishing Spear Phishing An email-borne attack that involves A more sophisticated form of phishing tricking the email recipient into where the attacker learns about the disclosing confidential information or victim and impersonates someone he downloading malware by clicking on a or she knows and trusts. hyperlink in the message. Ransomware Man in the Middle An attack that involves encrypting Where an attacker establishes a data on the target system and position between the sender and demanding a ransom in exchange recipient of electronic messages and for letting the user have access to intercepts them, perhaps changing the data again. them in transit 6 3 2023/04/11 Types of Cybersecurity Threats Malware Adware Spyware A malware attack is a Adware is a form of malware that Spyware is defined as common cyberattack where hides on your device and serves malicious software designed to malware executes you advertisements. Some enter your computer device, unauthorized actions on adware also monitors your gather data about you, and the victim's system behavior online so it can target forward it to a third-party you with specific ads. without your consent. Trojans Virus Worms Type of malware that enters a A virus is a type of self- Malware designed to propagate target system looking like one propagating malware which itself into other system. A worm thing, e.g., a standard piece of infects other actively works to infect other software, but then lets out the programs/files of a target targets (sometimes without any malicious code once inside via code injection. interaction on the user’s behalf). the host system. 7 Types of Cybersecurity Threats Denial of Service attack Attacks on IoT Devices Where an attacker takes over many IoT devices like industrial sensors are vulnerable to (perhaps thousands) of devices and uses multiple types of cyber threats. These include them to invoke the functions of a target hackers taking over the device to make it part of a system, e.g. a website, causing it to DDoS attack and unauthorized access to data being crash from an overload of demand. collected by the device. Data Breaches Malware on Mobile Apps A data breach is a theft of data by a Attackers may embed malware in app downloads, malicious actor. Motives for data mobile websites, or phishing emails and text breaches include crime (i.e. identity messages. Once compromised, a mobile device can theft), a desire to embarrass an give the malicious actor access to personal institution (e.g. Edward Snowden or the information, location data, financial accounts, and DNC hack), and espionage. more. 8 4 2023/04/11 “Passwords are like underwear. Don’t let people see it, change it very often, and you shouldn’t share it with strangers.” —Chris Pirillo 9 SAFEGUARDING! Cyber safety tips - protect yourself against cyberattacks CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon and infographics & images by Freepik 10 5 2023/04/11 Cybersecurity Emails Do not open email attachments from unknown senders Passwords Anti Virus Use strong passwords: Use anti-virus software: Security Ensure your passwords are solutions will detect and removes not easily guessable. threats Updates Always update your operating systems and software. 11 Modern life is fundamentally intertwined with the internet. Nearly every daily task now has opportunity for online integration, and most everyone owns multiple devices, including laptops, phones, tablets, smart watches, smart TVs and more. The more accounts and devices you have online, the greater the potential is for criminals to access your personal information and take advantage of you. Online safety is important no matter your age or life stage. 12 6