Anda di halaman 1dari 10

Cyber Security

BY: ZACHARY CLAUSEN


Types of Attacks/Malware

 Social Engineering
 Trojan Horse
 Worm
 Ransomware
 Adware
 Spyware

Image Credit: enzozo /Shuttershock


Social Engineering

Steal Information by:


 Impersonating an employee
 Sneaking into the building and gathering employee
information
 Dumpster dive for sensitive information not properly
disposed of
Trojan Horse Virus

These are malware that disguise themselves as an innocent


looking programs so you download them.

They can do a wide variety of things such as:


 Damage systems
 Copy data
 Delete data
 Block data
Worm

Worms are viruses that don’t require the aid of a human to


replicate or help infect other systems. All they do is look for
a vulnerability and enter through it. They are viruses that
are:
 Self replicating
 Self transmitting
Ransomware

Ransomware is a malware that holds the data on a system


hostage until an action is performed. It can be to pay a
certain account a sum of money or perform a certain task.
What is certain is the data held hostage can be:
 Deleted
 Sold
 Copied
Adware

 Adware is a malware that forces ads to be downloaded or


displayed without the users consent.
 It can redirect you to a site where ads are heavily present
and often not the site you initially wanted to go to.
 It gathers information on the user without the users
knowledge or consent.
Spyware

 A malware that secretly gathers information about a user


or system and sends it somewhere.
 Information can be what’s on the hard drive or it can be
what the user does.
 It can track keystrokes to gather data on what you
typically type which can lead to what passwords you use.
Protection/Prevention

Digital Physical
 Firewalls  Cameras
 Regular system scans  Electronic locks
 Up-to-date security  Security guards
 Two-factor authentication  Electronic badges
 Turnstiles
 Two door access rooms
 Protocols in employee handbook

Image Credit: popetech


References
 Engel, K., & Harvey, J. W. (2010, June 01). Influence of Awareness and Training on Cyber Security. Retrieved February 09,
2018, from Web.
 Granger, S. (2001, December 18). Social Engineering Fundamentals, Part I: Hacker Tactics. Retrieved February 9, 2018,
from Web.
 Hutcheson, D. (2007, June 19). Business Risks and Security Assessment for Mobile Devices . Retrieved February 09, 2018,
from Web.
 Thompson, S. T. (2006, December 01). Helping the Hacker? Library Information, Security, and Social Engineering. Retrieved
February 10, 2018, from Web.
 Woszczynski, A. B., & Green, A. (2017). Learning Outcomes for Cyber Defense Competitions. Journal Of Information
Systems Education, 28(1), 21-41.

Anda mungkin juga menyukai