Cyber security
Practice of protecting systems, networks, and programs from digital attacks to ensure confidentiality, integrity, and availability of data.
Malware
Malicious software disrupting, damaging, or gaining unauthorized access to computer systems. Types include viruses, worms, trojans, spyware, and adware.
Phishing
Fraudulent attempts to obtain sensitive information by posing as a trustworthy entity in electronic communications. Types include email phishing, spear phishing, smishing, and vishing.
Ransomware
Type of malware encrypting victim's files and demanding payment for decryption key. Examples include WannaCry, CryptoLocker, and NotPetya.
Insider Threats
Security risks from within the organization, involving malicious insiders, negligent insiders, and compromised insiders.
Vulnerabilities
Weaknesses in a system that can be exploited by threats, such as software bugs like buffer overflows, code injection, privilege escalation, weak passwords, and unpatched software.
Buffer Overflows
Errors occurring when a program writes more data to a buffer than it can hold, potentially allowing execution of arbitrary code.
Code Injection
Flaws enabling attackers to inject malicious code into a program, often through input fields.
Privilege Escalation
Vulnerabilities allowing attackers to gain elevated access to resources that are normally protected.
Weak Passwords
Easily guessable passwords providing an easy entry point for attackers due to common words or phrases, short length, and lack of complexity.
Unpatched Software
Outdated software lacking the latest security patches, making it vulnerable to attacks by exploiting known vulnerabilities.
Types of Cyber Attacks
Include malware (viruses, worms, trojans, spyware), which disrupt, damage, or gain unauthorized access to computer systems.
Viruses
Attach to legitimate programs or files, spread between computers, and can cause damage by deleting files, corrupting data, or slowing down system performance.
Worms
Self-replicating malware spreading without user intervention, exploiting network vulnerabilities to infect systems and cause disruption.
Trojans
Disguised as legitimate software but contain malicious code to create backdoors, steal information, or install additional malware.
Spyware
Secretly monitors and collects user information, tracking online activities, capturing keystrokes, and harvesting personal data for identity theft or espionage.
Adware
Automatically displays or downloads advertising material. Can track user behavior to deliver targeted ads. Can degrade system performance and invade privacy.