Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats - Coggle Diagram
Threats
-
Malware- any kind of malicious program that is installed on a computer with the intent to cause damage
Viruses- a computer program hidden in another computer, the virus code is only run when the host program is executed. They can delete data or change system files so data becomes corrupted
Worms- Do not need to be hosted in another program. They often create a back door so that a hacker can take over an infected computer. Worms are self replicating
Trojans- programs the user are tricked into installing under the pretence that they are legitimate and useful
Ransomware- malware that interferes with a users operation of a computer unless a sum of money (ransom) is paid
Spyware- malware that comes packaged with other software such as free software the user downloads. It gathers information about a user and sends it to the criminal
-
Social engineering
Phishing- uses fake emails and websites to trick people into giving away their sensitive data and information
Pretexting- the criminal invents a scenario where to persuade the victim to divulge information they may not do otherwise
shouldering- involves finding out login details, passwords and pins by watching people enter them
-
Brute force attacks- When a hacker attempts to crack a password by systematically trying different combinations of letter and numbers until the correct one is found
Denial of service (DoS) attacks- Attacks designed to bring down servers or websites by flooding them with superfluous bogus requests such as repeated attempts to log in. This uses up internet bandwidth and prevents the servers from responding to legitimate requests
The concept of SQL injection- Many websites use databases to store the details of users. Structured Query Language(SQL) is used to search these databases , for example to check a users login credentials are correct
SQL injection can be used to bypass security and circumvent the need to enter legitimate login credentials, thus allowing hackers to gain access to the database