Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber-security - Coggle Diagram
Cyber-security
malware
virus malware
A virus is a specific type of malware that self-replicates by inserting its code into other programs. A medical research laboratory was alerted by anti-virus software to the presence of a Trojan horse program (malware) on one of its internet facing web servers.
worm
Similar to viruses design often considered a subclass. However it can spread to your contacts by email.
trojen horse
program that appears harmless, but is, in fact malicious.
Untrusted sites downloaded from untrusted company
-
-
-
Social engerning
pretexting
Pretexting is a type of social engineering attack that involves a situation, or pretext, created by an attacker in order to lure a victim into a vulnerable situation and to trick them into giving private information, specifically information that the victim would typically not give outside the context of the pretext.
phishing
'Phishing' is when criminals use scam emails, text messages or phone calls to trick their victims. To help you avoid deceptive messages and requests, follow these tips.
Quid qro quo
a deceptive strategy where attackers offer a seemingly helpful service in exchange for valuable information or access to your system. when the supervisor asks for sexual favors in return for approving a promotion or giving the employee a raise.
bating scaming
an online ad offering free software leading to the victim introducing malware or a financial offering enticing them to complete an “urgent” task. Popular methods of accomplishing the first objective are to ask scammers to fill out lengthy questionnaires; to bait scammers into taking long trips; to encourage the use of poorly made props or inappropriate English-language idioms that surreptitiously cast doubt upon their scams
-
-
-