IT Weekly News Bits 14 April 2023: Click to find what is new for this week!

Banner

14 April

Weekly  IT NewsBits

TYPES OF CYBER THREATS:

The threats countered by cyber-security are three-fold:

Cybercrime

Cybercrime

Includes single actors or
groups targeting systems for
financial gain or to cause
disruption.

Cyberfattacks

Cyber-attack

Often involves
politically motivated
information
gathering.

Cyberterrorism

Cyberterrorism

It is intended to
undermine electronic
systems to cause panic
or fear.

 

 

 

 

 

How do malicious actors gain control of computer systems?

Here are some common methods used to threaten cyber-security:

Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks. There are a number of different types of malware, including:

 


 

Benefits

Virus

A self-replicating program that attaches itself to a  clean file and spreads throughout a computer system, infecting files with malicious code.

 

 


 

Trojan
 

Trojans

A  type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computer, where they cause damage or collect data.

 


 
 

 


Spyware

Spyware

A self-replicating program that attaches itself to a   clean file and spreads throughout a computer system, infecting files with malicious code.

 
 

 


Ransomware

Ransomware

Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.

 
 

 


Adware

Adware

Advertising software which can be used to spread malware.

 
 

 


Botnets

Botnets

Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission.

 
 

 

 


More on common methods used to threaten cyber-security

SQL injection

An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database

 

Man-in-the-middle attack

A cybercriminal intercepts communication between two individuals in order to steal data.

 

 

 

Phishing

Phishing  is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information, e.g. credit card info or passwords.

 
 

Denial-of-service attack 

Cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic.

 

Want to know more?

Check out this video about cybersecurity and types of cyber threats and attack!

 

Click here

 

Need more information on the information above? Click to visit the site.

 

 How to Subscribe?

The subscription will allow for recurring delivery of your chosen news weekly, monthly, or quarterly

 

Contact us.

We have an IT Service Desk on each campus.  Should you experience an IT-related problem please log a fault or contact your campus
IT Service Desk.

eMail us

talk2IT@nwu.ac.za