100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Unit 11 Cybersecurity - Cybersecurity threats (Summarised)

Rating
4.0
(1)
Sold
9
Pages
5
Uploaded on
24-08-2021
Written in
2021/2022

This document will contain summarised notes of cybersecurity threats which will help you in the cybersecurity exam when you have to do it.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
August 24, 2021
Number of pages
5
Written in
2021/2022
Type
Summary

Subjects

Content preview

Cybersecurity threats

How external threats occur

1. Malicious software

Malicious software contains a wide range of software with the purpose of causing damage
and harm to a computer system.
Some malicious software are less harmful than others e.g. adware ( software that appears or
downloads advertising material such as banners or pop ups when a user is online).
Meanwhile others can make a hard drive not being able to use e.g such as some viruses.

Examples of malware:

- Spyware: Gathers information on the user it has protected and sends it to third party
companies. Spyware can also access information through keyloggers which track what keys
you have entered; this can lead to the spyware having access to passwords.

- Adware: Adware displays unwanted advertisements to generate revenue e.g dating sites.
Also adware obstructs the user of pop up ads that will not disappear even after the pop up
has been closed.

- Ransomware: Ransomware is when the software takes control of your computer and
prevents it from accessing your computer system. Also ransomware demands a sum of
money to be paid in order for the user to get access to the account back.

- Viruses: Viruses modify existing programs with malicious code and replicate themselves
throughout the whole computer. This usually leads to corruption of data, applications,
system failure and taking up storage spaces and processing power.

- Worms: Worms perform similar to viruses, however worms can replicate themselves and
spread and invade the network or computer system. This allows them to perform similar
functions to viruses but on a much larger scale.

- Rootkits: Rootkits are used to get unauthorised administrator access to a computer or
network. They do this by spreading and hiding in software that has legitimate functions.
This can then be used to steal data or hide other malware within the system.

- Trojans: Trojans are malicious code that hides within a legitimate program. Most of the
time users download the trojan without knowing it is a malicious software thinking that they
were downloading the program that they would like. This can result in harmful attacks such
as files being stolen, systems being overridden etc.

, 2. Hacking

Hacking is a term that describes people who exploit the vulnerabilities (weak spots) of a
computer system to gain unauthorised access to the system and to its data. The method of
attack is called an attack vector which often involves exploiting vulnerabilities in areas such
as Wi-Fi, bluetooth, internet connection or gaining internal network access.
Individuals may perform hacking for many reasons such as hacktivism or to harm the
computer system or company. The reasons for individuals to hack into a computer system
may be performing it for things such as to gain money, to protest or perform their actions for
a political and social agendas.

Companies and governments use hacking for espionage purposes such as finding out their
competitor plans, products and finances to get profit or information. Companies will hire
other qualified people to hack into their own systems so that they can locate the
vulnerabilities in their system. These are called white hat hackers.



3. Sabotage

Sabotage is a general term that describes an activity used to deliberately disrupt services,
typically through the use of:

- Denial of service attacks
- Distributing malware
- Physically destroy computer equipment

These activities can be carried out by individuals, terrorist organisations, companies or
governments. However unlike the intention of hacking which is more about gaining
information or other purposes sabotage is specifically malicious with the goal of causing
damage.
The goal of these attacks are mainly targeted with hindering the victims this can cause
catastrophic impact to people if recovery procedures have not been prepared.



4. Social engineering

Social engineering refers to the techniques used to deceive people into revealing private and
confidential information. This can then be used for bank fraud & identity fraud or to gain
access to systems.

An example of this can be phishing emails where an email is sent for the main purpose of
the user downloading malicious software but the email is pretending to be somebody they
are not e.g a big company or someone the person knows. The email will often ask the user
to click on a link which then the malicious software will be downloaded.
Even Though the phishing emails may be worded unprofessionally the person will make the
email look as legit as possible so the user thinks its a normal email when its not.

Reviews from verified buyers

Showing all reviews
2 year ago

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
mohammedvankalwala Uxbridge College (London)
Follow You need to be logged in order to follow users or courses
Sold
201
Member since
4 year
Number of followers
151
Documents
23
Last sold
7 months ago

3.6

44 reviews

5
21
4
6
3
7
2
0
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions