A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Cyber Security

Adware
Adware

The adware and madware, more often than not, are going to report that information back to a third party. In the case of adware and madware, it’s just for marketing purposes, but if you had one piece of adware or madware on your devices, there’s a good chance you have another that’s collecting data for even more nefarious purposes.

source: us.norton.com
Bot
Bot

Spam bots usually post comments along with a link to promotional items to get readers redirected. Once the user leaves the legitimate site, their personal data may be at risk as hackers attempt to gather sensitive information for later use, or to sell for a profit (e.g. credit card information).

source: forbes.com
image: nanalyze.com
Bug
Bug

Understanding all the basic elements to cyber security is the first step to meeting those threats. Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

source: csoonline.com
Common Types of Cybersecurity Attacks
Common Types of Cybersecurity Attacks

It is not intended to be exhaustive, and attackers do evolve and develop new methods as needed; however, being aware of, and mitigating these types of attacks will significantly improve your security posture.

source: rapid7.com
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

source: acunetix.com
Cryptographer
Cryptographer

A Cryptographer develops algorithms, ciphers and security systems to encrypt sensitive information. A Cryptanalyst analyzes and decrypts any type of hidden information (e.g. encrypted data, cipher texts, telecommunications protocols) in cryptographic security systems.

image: prezi.com
Denial-of-Service Attacks
Denial-of-Service Attacks

Denial-of-service attacks can be difficult to distinguish from common network activity, but there are some indications that an attack is in progress. What is a denial-of-service (DoS) attack? In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services.

source: us-cert.gov
Malware Attacks
Malware Attacks

And, of course, these techniques can be used in tandem. For instance, phishing emails may try to trick users into downloading malware. Recent cyber attacks. Every year brings new security breaches, but this year has seen some of the most egregious and disturbing since the dawn of the internet age.

source: csoonline.com
Man-in-the-Middle (MITM) Attacks
Man-in-the-Middle (MITM) Attacks

MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker.

Phishing Attacks
Phishing Attacks

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

source: csoonline.com
Ransomware
Ransomware

Ransomware is also popularly used against businesses because they employ a lot of computers and ransomware can easily spread and lock more systems to increase the amount of ransom. Whether you are a business or a home user, you should know that the threat of ransomware is real.

image: botcrawl.com
Rootkit
Rootkit

If you're a victim of a crimeware attack you should disconnect from the Internet immediately. If you're connected via Wi-Fi, phone or Ethernet cable, you need to disable the connection as soon as possible to prevent data being transmitted to the criminal. Breaking your network connection is the best way to put an immediate stop to the attack.

source: us.norton.com
Security Administrator
Security Administrator

A Security Administrator is basically the point man/woman for cyber security systems. Although job descriptions vary widely, you will likely be responsible for installing, administering and troubleshooting your organization’s security solutions.

Security Analyst
Security Analyst

A Security Analyst detects and prevents cyber threats to an organization. Every day, you will ferret out the weaknesses of your infrastructure (software, hardware and networks) and find creative ways to protect it.

image: wfgsn.org
Security Architect
Security Architect

Security Architect Job Requirements Degree Requirements Since Security Architects are intimately involved in creating security systems and procedures, employers will require you to have a bachelor’s degree in Computer Science, Cyber Security or a related field.

Security Consultant
Security Consultant

All Security Consultants must understand IT security from the ground-up. That means organizations and consulting firms will require – at minimum – a bachelor’s degree in Computer Science, Cyber Security or a related field (e.g. Engineering).

Security Engineer
Security Engineer

Security Engineer Job Requirements Degree Requirements The job of a Security Engineer is a highly technical one, so employers will expect you to have a bachelor’s degree in Computer Science, Cyber Security or a related field.

image: youtube.com
Security Software Developer
Security Software Developer

The term “Security Software Developer” is one of a few related job titles on the market. Equivalent positions include: Cyber Developer; Security Developer; Security Software Engineer; Security Software Developer Salaries. According to Payscale, the median salary for a Software Developer is $65,668 (2014 figures).

Spear Phishing Attacks
Spear Phishing Attacks

Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Spear-phishing attempts are not typically initiated by random hackers, but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.

Spyware
Spyware

What is Spyware? Spyware is a type of computer program that attaches itself to your operating system, generally without your permission or knowledge. It can be designed to track your Internet use, generate advertising pop-ups, take you to advertising sites, or sometimes even log information that you type into your computer.

source: uco.edu
SQL Injection Attacks (SQLi)
SQL Injection Attacks (SQLi)

SQL (Structured Query Language) Injection What is SQL Injection. SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.

source: incapsula.com
Trojan Horse
Trojan Horse

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

What is Malware?
What is Malware?

First off malware is software that is written specifically to harm and infect a computer or a computer network. Malware has many forms including viruses, adware, spyware, worms, trojans and ransomware. Need some help understanding malware? Talk to our Cyber Security expert Stephen Sharkey today.