Cyber Threats To Systems Security

Cards (15)

  • System security
    Protection of systems, computers, programs and data from attack, damage or unauthorized access
  • Security threats
    • Attacks on systems and networks
  • Attack
    Data is viewed or vandalized without authorization
  • Types of attacks
    • Passive (data is monitored)
    • Active (data is modified)
  • Attacker location
    • Inside the organization
    • Outside the organization
  • Six out of seven security breaches come from the inside
  • Malware
    Any hostile or intrusive software
  • Types of malware
    • Viruses (insert into normal programs)
    • Worms (spread autonomously)
    • Trojans (disguised as desirable software)
    • Spyware (collects data)
    • Adware (generates unwanted ads)
  • Phishing
    Disguising a message to obtain sensitive information
  • Social engineering
    Exploiting human weaknesses to access data
  • Brute force attack
    Trying all possible combinations to gain access
  • Denial of service (DoS) attack
    Overloading a resource to prevent normal operation
  • Distributed denial of service (DDoS) attack

    DoS attack from multiple locations
  • SQL injection
    Exploiting vulnerabilities in database-driven websites to execute malicious SQL statements
  • SQL injection attacks are not very common because web developers know about them and can validate input