Please enable JavaScript.
Coggle requires JavaScript to display documents.
Issues - Coggle Diagram
Issues
Types of Attacker
-
Cyber criminal
Involves a computer, usually for profit. Can be done by anyone, lots of methods and techniques, lots of different crimes under one
Insider
Someone inside of an organisation, can happen due to a lack of security
Script kiddie
Lack of experience to write their own scripts. Unskilled and targets previously existing vulnerabilities. Mostly teens
Vulnerability broker
Sells information to a third party. Can include flaws in a device and information on how to hack it.
-
Phishers
Send emails with suspicious links which might get you to enter sensitive details without realising that you are doing so.
Cyber terrorists
Uses a computer to cause fear and disruption potentially for religious reasons. Not linked to somewhere in the world specifically.
Targets
Information is valuable to not only individuals and businesses but also to those who can acquire power, money or their chose objectives by stealing, publishing, altering or destroying it. Whether as an individual or part of an organisation, care must be taken to protect it.
Equipment - Mobile devices are the biggest cyber threat to businesses and individuals. They can easily pick up malware or give away information that can be passed onto the company's network and cause them to become infected. Usually not on purpose but still pose a threat
Organisations - All organisations whether private, public, governmental or not for profit can be subject to cyber threats. These threats can be external, internal, DoS, theft, misuse etc.
People - internet shopping can include fake websites which look genuine but can steal al of your data such as a bank card or back details.
Social media - challenging as employers can find old photos and videos of you that can be sued at a later time that could lose you a job.
Threats
-
State Sponsored attacks mean that a government has allowed the attack and are funding it and backing it.
-
-
-
-