Threats
Malware
Denial of Service (DoS)
Social Engineering
Range of effects
talking a target into revealing specific information or performing a specific action for illegal reasons
when a computer repeatedly sends requests to a server to overload the system and make it crash
Deleting, corrupting or encrypting files
Causing computers to crash, reboot or slow down
Reduces network speeds
Logging keyboard inputs and sending them to hackers
Definition
Computer code written to cause harm
Types of Malware
Adware
Botnet
Ransomware
Spyware
Trojan Horse
Virus
Worm
pieces of code capable of copying itself and spreading throughout a system
Obtains information about a users computer activities by transmitting data from their device
unwanted software designed to throw advertisements up on your screen, usually within a web browser
network of hijacked internet connected devices are installed with malicious codes
disguise of legitimate code or software to get inside a network and carry out harmful actions
malicious software designed to block access to a computer system until a sum of money is paid
a malicious program that can self-replicate itself without a host
manipulating technique that exploits human error to gain private information
Hacking
Types of hackers
black hat hackers
traditional hackers who attempt to gain data
grey hat hackers
not employed by companies, but locate flaws in company wide computer systems as a hobby
white hat hackers
hired by companies to help locate flaws where black hat hackers could attack and steal data
definition
attempt to gain access to computer systems with intent of damaging data or harming systems
Not all hacking is malicious intent