Date post: | 08-Aug-2015 |
Category: |
Education |
Upload: | mohd-hamizi |
View: | 59 times |
Download: | 2 times |
Understanding CyberThreats
Possibility of or attempt of gaining unauthorized "access to a device or system or network using a data communication pathway
The 10 most common Cyber Threats
Malware malicious software computer viruses, worms, Trojan horses,
dishonest spyware, and malicious rootkits
Computer virus small piece of software that can spread from
one infected computer to another corrupt, steal, or delete data on your
computer
Rogue security software pop-up window that advertises a security
update or alert on your computer screen
Trojan horse infect their computers with Trojan horse
software simply by downloading an application they thought was legitimate but was in fact malicious
Malicious spyware used to describe the Trojan application that
was created by cybercriminals to spy on their victims
Computer worm software program that can copy itself from
one computer to another, without human interaction
replicate in great volume and with great speed
Botnet Group of computers connected to the
Internet that have been compromised by a hacker using a computer virus or Trojan horse
Spam security context is primarily used to
describe email spam unwanted messages in your email inbox clutter your mailbox as well as potentially
take up space on your mail server
Phishing Fraudulent attempts by cybercriminals to obtain
private information Often appear in the guise of email messages
designed to appear as though they are from legitimate sources
Rootkit collection of tools that are used to obtain
administrator-level access to a computer or a network of computers
Who Are the Culprits Behind Cyberthreats?
How Do Cyberattacks Affect your Organization?
When your Organization is robbed digitally … the pool
of suspects is limited to the number of people on the
face of the earth that have a laptop and an Internet
connection, because anybody with an Internet
connection potentially can attack any other computer
that's tied to the network.
So the barrier of entry is relatively low.
Your organization not only suffer direct financial losses due to cyberattacks but they also face enormous costs when they are victimized by large-scale data breaches following these attacks.
These costs include but are not limited to: Investigation and forensic costs
Customer and partner communications costs
Public relations costs
Lost revenue due to a damaged reputation
Regulatory fines
Civil claims and legal fees