Please enable JavaScript.
Coggle requires JavaScript to display documents.
Types Of Threats (Botnet (A botnet is a collection of devices that have…
Types Of Threats
Botnet
A botnet is a collection of devices that have been infected with a bot program which allows an attacker to control them.
Attackers can plant bot programs on a device in many ways. One common method is to use an exploit kit hosted on a website to probe every site visitor's device for an exploitable flaw; if one is found, the kit silently downloads and installs the bot.
Black Hat Hacker
A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
White Hat Hacker
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.
Grey Hat Hacker
Grey hat. The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
Bug
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
Adware
Adware is frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".
Pharming
Pharming is a cyber attack intended to redirect a website's traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software.
DDoS
DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.
Ransomware
Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Rootkit
A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit."
Spyware
Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.
Trojan Horse
Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
Virus
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Worm
A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance.
Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication.
Pretexting
Pretexting is a form of social engineering in which an individual lies to obtain privileged data. A pretext is a false motive. Pretexting often involves a scam where the liar pretends to need information in order to confirm the identity of the person he is talking to.
-
-
Shoulder Surfing
the practice of spying on the user of a cash-dispensing machine or other electronic device in order to obtain their personal identification number, password, etc.