Show All Answers
The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
So, how do malicious actors gain control of computer systems? Here are some common methods used to threaten cyber-security:
Malware means malicious software. One of the most common cyber threats, malware, is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks.
There are several different types of malwares, including:
Malware can be distributed through various means, including infected email attachments, malicious websites, software downloads from untrustworthy sources, or exploiting security vulnerabilities. It's crucial to maintain up-to-date security software, regularly patch software and operating systems, exercise caution when clicking on links or downloading files, and practice safe browsing habits to reduce the risk of malware infections.
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information.
While some phishing emails can be quite convincing, there are several signs you can look for to determine if an email is a phishing attempt. Here are some indicators to consider:
Remember that phishing techniques are constantly evolving, and attackers can become quite sophisticated. If you have any doubts about an email's authenticity, it's advisable to contact the organization directly through their official website or customer support channels to verify its legitimacy.