Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security - Coggle Diagram
Cyber Security
Malware
Adware is a type of malware. At its least dangerous it will attempt to flood an end-user with unwanted advertising.Although not necessarily harmful, adware can:
highlight weaknesses in a user’s security defenses
be hard to remove – it defeats most anti-malware software since it can be difficult to determine whether or not it is harmful
hijack a browser and create its own default search requests.
Worms are a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks.
Viruses are programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files, or causing a computer to malfunction.
Spyware is software that gathers information by monitoring a user’s activities carried out on their computer. The gathered information is sent back to the cybercriminal who originally sent the spyware.
A Trojan horse is a program which is often disguised as legitimate software but with malicious instructions embedded within it.
Social Engineering
Social engineering occurs when a cybercriminal creates a social situation that can lead to a potential victim dropping their guard. It involves the manipulation of people into breaking their normal security procedures and not following best practise
Phishing
Phishing occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal data
Denial of Service Attack
A denial of service (DoS) attack is an attempt at preventing users from accessing part of a network, notably an internet server.
pharming
Pharming is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge.
-
Brute Force Attack
A method to obtain someone's password by systematically trying all the different combinations of letters, numbers and other symbols until eventually the password is found
Data Interception
Methods used to compromise privacy or to obtain confidential information by stealing data by tapping into a wired or wireless communication link.