1 understanding cyber threats

Post on 08-Aug-2015

59 views 2 download

Tags:

Transcript of 1 understanding cyber threats

Understanding CyberThreats

Possibility of or attempt of gaining unauthorized "access to a device or system or network using a data communication pathway

The 10 most common Cyber Threats

Malware malicious software computer viruses, worms, Trojan horses,

dishonest spyware, and malicious rootkits

Computer virus small piece of software that can spread from

one infected computer to another corrupt, steal, or delete data on your

computer

Rogue security software pop-up window that advertises a security

update or alert on your computer screen

Trojan horse infect their computers with Trojan horse

software simply by downloading an application they thought was legitimate but was in fact malicious

Malicious spyware used to describe the Trojan application that

was created by cybercriminals to spy on their victims

Computer worm software program that can copy itself from

one computer to another, without human interaction

replicate in great volume and with great speed

Botnet Group of computers connected to the

Internet that have been compromised by a hacker using a computer virus or Trojan horse

Spam security context is primarily used to

describe email spam unwanted messages in your email inbox clutter your mailbox as well as potentially

take up space on your mail server

Phishing Fraudulent attempts by cybercriminals to obtain

private information Often appear in the guise of email messages

designed to appear as though they are from legitimate sources

Rootkit collection of tools that are used to obtain

administrator-level access to a computer or a network of computers

Who Are the Culprits Behind Cyberthreats?

How Do Cyberattacks Affect your Organization?

When your Organization is robbed digitally … the pool

of suspects is limited to the number of people on the

face of the earth that have a laptop and an Internet

connection, because anybody with an Internet

connection potentially can attack any other computer

that's tied to the network.

So the barrier of entry is relatively low.

Your organization not only suffer direct financial losses due to cyberattacks but they also face enormous costs when they are victimized by large-scale data breaches following these attacks.

These costs include but are not limited to: Investigation and forensic costs

Customer and partner communications costs

Public relations costs

Lost revenue due to a damaged reputation

Regulatory fines

Civil claims and legal fees