Please enable JavaScript.
Coggle requires JavaScript to display documents.
threats - Coggle Diagram
threats
-
malware
viruses
a virus is a computer program that is hidden within another program. the virus code is only run when the host program is executed.
worms
worms are different to viruses as they do not need to be hosted in another program. they often create a 'back door' so that the hacker can take over an infected computer.
trogans
trojans are programs that users are tricked into installing under the pretence that they are legitimate and useful.
ransomware
ransomware is malware that interferes with a user's operation of a computer unless a sum of money (ransom) is paid.
spyware
spyware is malware that comes packaged with other software such as free software that a user downloads.
pharming
pharming is a form of attack where users are directed to fake websites and they can steal there money or accounts.
social engineering
phishing
phishing uses fake emails and websites to trick people into giving people away their sensitive data and information. emails usually claim or appear to be from a bank or building society, an e-commerce site or an email provider.
pretexting
pretexting, also known as blagging, is often done by phone but can also be carried face to face. here, the criminal invents a scenario to persuade the victim to divulge information that might not do otherwise.
shouldering
shouldering, or shoulder suffering, involves finding out login details, passwords and pins by watching people enter them.
-
brute force attacks
a brute force attack is where a hacker attempts to crack a password by systematically trying different combinations of letters and numbers until the correct one is right.
-
-
malware-is any kind of malicious program that is installed on a computer system with the intention to cause damage and disrupt its functionality or to steal information. it is usually installed without the users knowledge
the weakest point of any computer system is the people that use it. social engineering is a form of security attack that involves tricking or manipulating into giving away critical information or access details.
data is very valuable commodity. personal data can be used to access bank accounts or in identity theft, while he financial data or trade secrets of a company can be exploited by others to gain a competitive advantage.