Malware
Software programs designed to cause damage to a computer system and steal information
Viruses
A type of malware that attaches itself to legitimate files and programs, spreading. This can cause harm to files, altering them and slowing down computer performance but also compromising sensitive data.
Worms
A type of self-replicating malware that spreads across networks by exploiting security vulnerabilities, without needing to attach itself to another program to spread
Trojan Horses
A type of malware that disguises itself as a harmless program, to trick users into installing it onto their computers. This can extort sensitive data
Ransomware
A type of malware designed to seize access to your files and computer system, holding them for ransom to extort money from the user
Spyware
A type of malware that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.
Pharming
A type of online fraud that uses malicious code to direct victims to spoofed websites, to steal private details (e.g. account number, login password etc.)
Social Engineering
Methods used to trick people into divulging sensitive information, by preying on human fears and instincts.
Phishing
A type of fraud in the form of fake emails and messages from supposedly ‘legitimate’ companies, designed to extort private information by tricking the user
Pretexting/ blagging
A social engineering tactic where a person uses a convincing but fake story or scenario to deceive someone into compromising sensitive information
Shouldering
A social engineering tactic where someone looks at a person’s private information, like a PIN or password, by looking over their shoulder
Brute Force Attacks
A trial-and-error method used by hackers to guess login credentials by systematically trying all possible combinations.
Distributed Denial of Service (DDoS)
A coordinated attack with the intention of disrupting the normal functioning of a network, website or server by using an army of compromised machines, a botnet, to send many simultaneous requests to overload network.
Packet Sniffing
The interception and examination of data packets as they travel across a network, in order to collect private and sensitive information.
Man In The Middle (MITM) attacks
A cyberattack where an attacker intercepts communication between two parties to eavesdrop or tamper with the data being exchanged
SQL injections
An active cyber attack where a malicious SQL command is entered into a website’s input fields (like a login or search box) to gain unauthorized access to data from a database, in order to delete, view or modify it
Penetration testing
The process of using “ethical hacking” methods to find and exploit vulnerabilities in a system, in order to test its resilience if faced with malicious hackers or malware
Anti Malware Software
A program designed to prevent, detect, and remove malware from your computer or network, scanning the network for worms, viruses and trojans.
Firewalls
A network security system that acts as a barrier between a network and the internet by monitoring incoming and outgoing network traffic. It blocks and filters inappropriate content.
User Access Levels
A hierarchy of permissions that determine what files, software, and other resources a user can interact with on a computer or network.
Encryption
The process of encoding a message/information, which can only be decoded using a key, so only authorised persons can access and understand it