Cyber Attacks and Protection 5 / 5

Cyber Attacks

Phishing

The cyber-attacker sends emails to the victim (which look like they're from someone else eg a bank) - the victim replies with their confidential info

Pharming

The cyber-attacker redirects visitors from to a bogus website. The intention is to collect data in order to commit fraud
and is similar to phishing.

Hacking

The cyber—attacker gains unauthorised access to an organisation's computer system

Denial of Service

The cyber-attacker prevents people from accessing the organisation's website.
Botnets (large numbers of individual computers which have been taken over without the user knowing) are instructed to overwhelm the organisation's website and cause it to crash.

Webcam Control

The cyber-attacker uses software to take control of the user’s webcam.

File hijacker/ransomware

The cyber-attacker gains access to the user's system to hijack their files and hold them to ransom

Keylogging

The cyber—attacker plants software onto the user’s computer to record what the user types onto their keyboard.

Ad clicker

The cyber-attacker directs the victim’s computer to a bogus website by encouraging them to click on a
specific link contained in online advertising

Protection against Cyber - Attacks

Access Control

These are physical and network procedures to restrict access to a system.

Firewalls and Gateways

These intercept data being transmitted in and out of a system.

Malware and virus protection

These prevent installation of suspicious programs

Patches

These ensure that the latest software updates are installed on the system when available.

Secure Configuration

The organisation should have a policy which states that systems should be set up with cyber security as a priority.

We use cookies to help make our website better. We'll assume you're OK with this if you continue. You can change your Cookie Settings any time.

Cookie SettingsAccept