Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security - Joash Ambrister - Coggle Diagram
Cyber Security - Joash Ambrister
Hacking
Hacking is one of the main concerns when it comes to Cyber security, It is generally referred to as gaining illegal access to another person's computer system or account. Identity theft or personal information being stolen is often result of Hacking
Denial of Service Attack
Denial of Service Attack also known as
DDoS
is an attempt to stop users from accessing part of a network, more commonly an internet server. It can be done by flooding the network with useless spam traffic which can overload the network since it can only process so much.
Brute Force Attack
A Brute Force Attack is when a hacker tries to crack your password by using different combinations of letters, words and numbers in the hopes of eventually finding your account
Social Engineering
Social Engineering is a more interactive approach to breaching your security; It cons people into believing that a person or app will protect them from cyber threats and instead steal information.
Ex: Fake anti-virus program, IT support phone call that installs spyware onto your computer
Malware
Virus
Viruses are programs or program codes that copy themselves, intending to delete files or corrupt them. Often viruses are hidden in emails or links. While it is running in the background, it changes file settings, and data Viruses need a host that needs to be activated or triggered in order to begin its corruption.
Spyware
Spyware is a software that typically gathers information by monitoring a user's actions. The collected data will then be sent out to the source who created it. Spyware can be used to unknowingly record you on your device webcam or capture your search history and your passwords as you type them.
Trojan Horse
Trojan Horse are a type of deceiving malware. It disguises itself by pretending to be an authentic and legitimate program while secretly inhibiting malicious software within it that can harm the computer.
Adware
Adware is considered on the side of least harmful malware, it's aim is to spam the user's screen with a multitude of advertisements that block the screen with popups and links that can be very hard and annoying to remove
Worms
Worms are considered more complex viruses. It can cause damage without an active host and targets entire networks instead of the sole computer. Worms can spread to other computers through the network with ease because of the network being down.
Ransom-wire
Ransom wire is closely linked with extortion. The program intends to encrypt computer data that makes your computer and all of its information inaccessible because it's been 'held captive', and the cybercriminal will ask for a price in return for a decryption key.
Data Interception
Data Interception is a form of hijacking personal information through a wired or wireless communication link. It is typically carried out to obtain confidential information
Phishing
Phishing is a form of deception cyber threat. A cybercriminal will send an email that looks legitimate and leave a link to a fake website where the user will insert their personal data which then gives the cybercriminal access to their real account.
In Phishing, the cybercriminals will try to imitate big companies like Amazon or Paypal
Pharming
Pharming is similar to Phishing but instead of an email with a fake website link. Pharming can have downloaded malicious code or infect an entire website that redirects the user's browser to a fake browser without the user's knowledge.