Site Loader
Rock Street, San Francisco

A type of malware that prevents users from accessing their
information or system, either by locking access to a system or by locking the
users’ files unless a ransom is paid.

Non or low technology means used to attack information
systems. Such as lies, impersonation, tricks, bribes, blackmail, and threats.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Any type of deliberate deception for unfair or unlawful gain
online. These are traditional fraudulent activities that leverage the internet
to obtain the same end results (e.g., such as online credit card theft, non
delivery of paid products purchased online).

An incident wherein information is stolen or taken from a
system without authorisation. Typically sensitive, proprietary, or confidential
information, such as credit card numbers, customer data or trade secrets are

Attacks utilising various methods which target privileged
users who are considered to have ‘keys to the kingdom’. Privileged users
typically have non-restrictive access to certain systems where they are able to
modify system users and configurations and view restricted data.

Downloads which have been unknowingly authorised by the a
user without understanding the consequences. Often the download appears
legitimate, however the downloaded software will also install a computer virus,
spyware, malware, or crimeware without the user’s knowledge.

Phishing is a form of identity theft in which a scammer uses
an authentic-looking email from a legitimate business to trick recipients into
giving out sensitive or confidential information, such as a credit card, bank
account or other sensitive personal information.

Rogue devices are always malicious in nature. Their sole
purpose is to do harm to your network, to steal information or to disrupt
network operations.

Distributed denial of service is a type of cyber attack that
entails having attackers utilise a large network of remote PCs, called botnets,
to overwhelm another system’s connection or processor, causing it to deny
service to the legitimate traffic it’s receiving.

Focused attacks on the ‘weakest link’ associated with a
organisation’s supply chain. Typically attacks are performed on the supplier’s
technology systems, software and networks as suppliers and vendors may have
fewer security controls in place than host organizations.

Vulnerabilities found in the performance-enhancing feature
of most modern processors (speculative execution and branch prediction), where
a flaw exists that allows unauthorized disclosure of information.


Post Author: admin


I'm Eunice!

Would you like to get a custom essay? How about receiving a customized one?

Check it out