Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity Threats, Vulnerabilities, and Attacks, (Distribute the…
Cybersecurity Threats, Vulnerabilities, and Attacks
CyberAttacks
Types
-
-
-
Logical Bombs
A logic bomb is a malicious program that waits for a trigger, such as a specified date or database entry
-
Ransomware
This malware is designed to hold a computer system or the data it contains captive until a payment is made.
-
Domain Name System
-
-
-
-
Keyboard Logging
As the name suggests, keyboard logging or keylogging refers to recording or logging every key struck on a computer’s keyboard
-
Types of Cyber Threats
Software attacks
Software error
Sabotage
Human error
Theft
Hardware failures
Utility interruption
Natural disasters
Deception
Social Engineering
-
-
Shoulder surfing is a simple attack that involves observing or literally looking over a target’s shoulder to gain valuable information such as PINs, access codes or credit card details.
Piggybacking and Tailgating
Piggybacking or tailgating occurs when a criminal follows an authorized person to gain physical entry into a secure location or a restricted area
-
-
-
-
-
Configure firewalls to remove any packets from outside the network that have addresses indicating that they originated from inside the network.
-
-
-
-
-
-