Cyber security
Malicious Code Social Engineering Detect and prevent
Penetration Testing
Malicious Code or Malware VirusTrojanSpywareAdware
Computer Virus A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. They commonly spread through s – remember don’t open an if it looks suspicious.
Trojan A Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent. Named after the original Trojan horse from Greek myth
Spyware Spyware is software that aims to gather information about a person or organisation without their knowledge and that may send such information to another entity without their consent.
Adware a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "un-closable window” Unlike most malware, Adware is not illegal and so is used by some well known companies Malware
Social Engineering Blagging Phishing Pharming Shouldering Social engineering is a set of methods criminals use to trick us into handing over information like passwords and credit card details. Hover over a topic on the left for more information
Social Engineering Blagging Phishing Pharming Shouldering Blagging is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. Example are the Nigerian Prince scam and more recently the s from friends who have been mugged (in a foreign country) and need you to send money.
Social Engineering Blagging Phishing Pharming Shouldering Phishing is when the user is sent a fake . It might look like it comes from a bank or other legitimate business. The criminal hopes that the user will follow give away some important information eg by following a link to a false website and logging in with their ID.
Social Engineering Blagging Phishing Pharming Shouldering Pharming is a cyber attack intended to redirect a website's traffic to another, fake site. This can be done by hacking a DNS server or redirecting your computer electronically.
Social Engineering Blagging Phishing Pharming Shouldering Shouldering is a simpler way of obtaining peoples Password or Pin Numbers. Criminals just stand behind and watch what you type.
Detect and prevent Some of the measures which can be taken to improve system security. Click images for more information Biometric measures Password systems CAPTCHA Using confirmations to confirm a user’s identity Automatic software updates.
Captcha-Completely Automated Public Turing Test To Tell Computers and Humans Apart A Captcha is a test that a human can pass but a computer program cannot. They stops people writing programs that automatically sign in to websites. An automatic program could try thousands of passwords.
Biometrics Biometrics are ways of using something that is unique to you as a person. A fingerprint / or thumbprint is common Iris scanners and hand scanners are also used. Phones and tablets are often protected this way
Passwords Many websites and computers systems require us to use a password to access. In companies different users may have very different levels of access to secure information. Password tips Don’t use a word or a name Include digits, capitals and or special characters Change your password regularly Don’t write it down Don’t let others watch you type it in
Confirmation When you sign up to a new site like Ebay or Amazon, you are typically asked to provide an address. An is then sent with a link to confirm your identity. This does not prevent people presenting fake identities as accounts are easy to create but does stop hackers creating thousands of accounts automatically
Automatic Software Updates What do you do when you see those little icons and pop-up messages that appear in the system tray, indicating there is a new software update available for you to download and install? Most people find such notifications and the process of installing new software updates insignificant and disrupting. The truth is, people ignore such notifications for various reasons, such as, ‘Do I really need to install this update?’, ‘My computer is working just fine, I don’t think this update is for me!’, ‘I don’t have time to reboot my computer’, etc. If you are accustomed to dismissing those update notifications, you need to reconsider that practice. Applying software updates is one of the most important things you can do with your computer. In fact, if you don’t do it, you’re very likely going to get some kind of malware in your system and even get hijacked. (SuperAntiSpyware 2013)