Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
Preventive strategies include installing and regularly updating antivirus software, and avoiding clicking on suspicious links.
Password Theft
Password theft refers to the unauthorized access to and use of someone’s password, leading to identity theft and data breach.
Preventive strategies include using strong, unique passwords, regularly updating them, and enabling two-factor authentication.
Traffic Interception
Traffic interception, also known as eavesdropping or sniffing, is the process of intercepting and potentially altering the communication between two parties without their knowledge.
Preventive strategies include the use of VPNs and encrypting data before transmission.
Phishing Attacks
Phishing attacks are attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Preventive strategies include employee education and awareness training, and the use of email filtering software.
Distributed Denial of Service (DDoS) Attacks
DDOS is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
Preventive strategies include the use of DDoS protection services and overprovisioning bandwidth.
Cross Site Scripting (XSS)
Also known as Cross-Site Scripting, XSS is a type of injection where malicious scripts are injected into trusted websites.
Preventive strategies include the use of web application firewalls, regularly updating and patching systems.
SQL Injection
SQL Injection is a code injection technique that might destroy your database. It is one of the most common web hacking techniques.
Preventive strategies include the use of prepared statements with parameterized queries, regular code review, and penetration testing.
Ransomware
Ransomware is malicious software designed to block access to a computer system until a sum of money is paid.
Preventive strategies include regular and secure backups of important data, and employee training and awareness.
Cryptojacking
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency.
Preventive strategies include the use of network monitoring tools, and regular system checks and updates.
Trojan Virus
A Trojan virus is a malicious program that performs actions not authorized by the user, such as modifying, blocking, or deleting data.
Preventive strategies include the use of robust antivirus software and avoiding downloading files or clicking on links from unknown sources.
Common Cybersecurity Strategies [7]
Types of Data Analytics for auditing [4]
Disadvantages of Data Analytics in Auditing [4]
Use of ICT by Auditor [4]
Benefits of Using ICT [4]
Limitations of Using ICT [4]