Threats

Malware

Denial of Service (DoS)

Social Engineering

Range of effects

talking a target into revealing specific information or performing a specific action for illegal reasons

when a computer repeatedly sends requests to a server to overload the system and make it crash

Deleting, corrupting or encrypting files

Causing computers to crash, reboot or slow down

Reduces network speeds

Logging keyboard inputs and sending them to hackers

Definition

Computer code written to cause harm

Types of Malware

Adware

Botnet

Ransomware

Spyware

Trojan Horse

Virus

Worm

pieces of code capable of copying itself and spreading throughout a system

Obtains information about a users computer activities by transmitting data from their device

unwanted software designed to throw advertisements up on your screen, usually within a web browser

network of hijacked internet connected devices are installed with malicious codes

disguise of legitimate code or software to get inside a network and carry out harmful actions

malicious software designed to block access to a computer system until a sum of money is paid

a malicious program that can self-replicate itself without a host

manipulating technique that exploits human error to gain private information

Hacking

Types of hackers

black hat hackers

traditional hackers who attempt to gain data

grey hat hackers

not employed by companies, but locate flaws in company wide computer systems as a hobby

white hat hackers

hired by companies to help locate flaws where black hat hackers could attack and steal data

definition

attempt to gain access to computer systems with intent of damaging data or harming systems

Not all hacking is malicious intent