1 understanding cyber threats

16
Understanding CyberThreats

Transcript of 1 understanding cyber threats

Page 1: 1   understanding cyber threats

Understanding CyberThreats

Page 2: 1   understanding cyber threats

Possibility of or attempt of gaining unauthorized "access to a device or system or network using a data communication pathway

Page 3: 1   understanding cyber threats

The 10 most common Cyber Threats

Malware malicious software computer viruses, worms, Trojan horses,

dishonest spyware, and malicious rootkits

Page 4: 1   understanding cyber threats

Computer virus small piece of software that can spread from

one infected computer to another corrupt, steal, or delete data on your

computer

Page 5: 1   understanding cyber threats

Rogue security software pop-up window that advertises a security

update or alert on your computer screen

Page 6: 1   understanding cyber threats

Trojan horse infect their computers with Trojan horse

software simply by downloading an application they thought was legitimate but was in fact malicious

Page 7: 1   understanding cyber threats

Malicious spyware used to describe the Trojan application that

was created by cybercriminals to spy on their victims

Page 8: 1   understanding cyber threats

Computer worm software program that can copy itself from

one computer to another, without human interaction

replicate in great volume and with great speed

Page 9: 1   understanding cyber threats

Botnet Group of computers connected to the

Internet that have been compromised by a hacker using a computer virus or Trojan horse

Page 10: 1   understanding cyber threats

Spam security context is primarily used to

describe email spam unwanted messages in your email inbox clutter your mailbox as well as potentially

take up space on your mail server

Page 11: 1   understanding cyber threats

Phishing Fraudulent attempts by cybercriminals to obtain

private information Often appear in the guise of email messages

designed to appear as though they are from legitimate sources

Page 12: 1   understanding cyber threats

Rootkit collection of tools that are used to obtain

administrator-level access to a computer or a network of computers

Page 13: 1   understanding cyber threats

Who Are the Culprits Behind Cyberthreats?

Page 14: 1   understanding cyber threats
Page 15: 1   understanding cyber threats

How Do Cyberattacks Affect your Organization?

When your Organization is robbed digitally … the pool

of suspects is limited to the number of people on the

face of the earth that have a laptop and an Internet

connection, because anybody with an Internet

connection potentially can attack any other computer

that's tied to the network.

So the barrier of entry is relatively low.

Page 16: 1   understanding cyber threats

Your organization not only suffer direct financial losses due to cyberattacks but they also face enormous costs when they are victimized by large-scale data breaches following these attacks.

These costs include but are not limited to: Investigation and forensic costs

Customer and partner communications costs

Public relations costs

Lost revenue due to a damaged reputation

Regulatory fines

Civil claims and legal fees