2. Possibility of or attempt of gaining unauthorized "access to a
device or system or network using a data communication
pathway
3. The 10 most common Cyber Threats
Malware
malicious software
computer viruses, worms, Trojan horses, dishonest
spyware, and malicious rootkits
4. Computer virus
small piece of software that can spread from one
infected computer to another
corrupt, steal, or delete data on your computer
5. Rogue security software
pop-up window that advertises a security update or
alert on your computer screen
6. Trojan horse
infect their computers with Trojan horse software
simply by downloading an application they thought
was legitimate but was in fact malicious
7. Malicious spyware
used to describe the Trojan application that was
created by cybercriminals to spy on their victims
8. Computer worm
software program that can copy itself from one
computer to another, without human interaction
replicate in great volume and with great speed
9. Botnet
Group of computers connected to the Internet that
have been compromised by a hacker using a
computer virus or Trojan horse
10. Spam
security context is primarily used to describe email
spam
unwanted messages in your email inbox
clutter your mailbox as well as potentially take up
space on your mail server
11. Phishing
Fraudulent attempts by cybercriminals to obtain private
information
Often appear in the guise of email messages designed to
appear as though they are from legitimate sources
12. Rootkit
collection of tools that are used to obtain
administrator-level access to a computer or a
network of computers
15. How Do Cyberattacks Affect your Organization?
When your Organization is robbed digitally … the pool of
suspects is limited to the number of people on the face of the
earth that have a laptop and an Internet connection, because
anybody with an Internet connection potentially can attack any
other computer that's tied to the network.
So the barrier of entry is relatively low.
16. Your organization not only suffer direct financial losses due to
cyberattacks but they also face enormous costs when they are
victimized by large-scale data breaches following these attacks.
These costs include but are not limited to:
Investigation and forensic costs
Customer and partner communications costs
Public relations costs
Lost revenue due to a damaged reputation
Regulatory fines
Civil claims and legal fees