14 April
Weekly IT NewsBits
TYPES OF CYBER THREATS:
The threats countered by cyber-security are three-fold:
Includes single actors or
groups targeting systems for
financial gain or to cause
disruption.
Cyber-attack
Often involves
politically motivated
information
gathering.
Cyberterrorism
It is intended to
undermine electronic
systems to cause panic
or fear.
How do malicious actors gain control of computer systems?
Here are some common methods used to threaten cyber-security:
Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks. There are a number of different types of malware, including:
Virus
A self-replicating program that attaches itself to a clean file and spreads throughout a computer system, infecting files with malicious code.
Trojans
Spyware
Ransomware
Adware
Botnets
More on common methods used to threaten cyber-security
SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database
Man-in-the-middle attack
A cybercriminal intercepts communication between two individuals in order to steal data.
Phishing
Denial-of-service attack
Cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic.
Want to know more?
Check out this video about cybersecurity and types of cyber threats and attack!
Need more information on the information above? Click to visit the site.
Contact us.
We have an IT Service Desk on each campus. Should you experience an IT-related problem please log a fault or contact your campus
IT Service Desk.
eMail us