The technical and non-technical threats that may cause damage to an organsation
Technical Threats
Botnets and DDoS attacks
A bot is a type of malware that allows a cyber security attacker to take control of a digital system that has been infected without the user's knowledge. It can result in a botnet which is an interconnected network o infected computer systems
The result of a DoS attack is that users are unable to access the network systems
A DDoS attack has the same aim as a DoS attack, but a DDoS attack uses many digital systems to carry out the attack
A DDoS attack is another type of attempt to make a digital or network system unavailable to its users.
The types of websites that a DDoS or DoS attack affects are usually high profile web servers, such as banks, payment websites and mobile phone companies.
Hacking, Cross site scripting, Password cracking software and SQL injections
Brute force password cracking is when someone uses every combination of letters, digits and special symbols to find the password.
In a brute force attack, a dictionary is used, it is a list of predefined passwords. This can include a list of the most commonly used passwords or words from a dictionary.
When creating a password you should use at least 12 characters when making it.
An SQL threat exploits a weakness in website or a web-based application. An SQL Injection puts malicious code in SQL statements, via web page input. The main purpose of an SQL injection is to exploit software vulnerabilities in a websites or web-based applications.
Adware, Key loggers, Remote access Trojan, Ransomware, Spyware, Trojan, Virus, Worm
The purpose of adware is to generate revenue for its author by installing a software package which automatically shows adverts, such as pop-ups. It may also be in the user interface of a software package or on an installation screen.
RAT stands for Remote access Trojan
Ransomware can restrict user access to the computer system by encrypting files or locking down the computer system. It is spread like a worm and can be started by downloading an infected file or by a vulnerability on the computer system.
Spyware can sometimes lead to to changes in the computer settings which could lead to slow internet connection speeds or changes in web browser settings.
Worms almost always cause some harm to a network, even if only be consuming bandwidth.
Non-technical Threats
Malicious employees area also known as turncloaks. They typically use their access details in malicious and deliberate way to steal information and data for financial or personal reasons.
Comments
Post a Comment