Types of Cyber Security Threats

Types of Cyber Security Threats: Ransomware, Malware, Social engineering, Phishing

Types of Cyber Security Threats : Cyber security threats take many forms;

Ransomware is a type of malware that involves an attacker locking the victim's computer system files typically through encryption of files and demanding a payment to decrypt and unlock the files.

Malware is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.

Social engineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain access to sensitive information that is typically protected.

Phishing is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention of these emails is to steal sensitive data, such as credit card or login information.

Cyber-attacks will cause financially and reputational damage to the organisation. The organisation which suffers cyber-attack, may have to face the losing assets, business reputation and potentially the organisation have to face regulatory fines.




Kaseya Cyber Attack | Kaseya Ransomware Attack

About 200 US businesses have been hit by ransomware attack, according to a cyber-security firm.

Classification of Cyber Crimes | Cyber Attacks

The cyber criminal could be internal or external to the organization facing the cyber attack

Types of Cyber Security Threats

Types of Cyber Security Threats: Ransomware, Malware, Social engineering, Phishing

Understanding Ransomware | Defending Against Ransomware

Understanding Ransomware and Defending Against Ransomware

Cyber Security Structure Attacks | Unstructured Attacks

The cyber attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the attacker

Guideline for setting secure Password

Guideline for setting secure Password. Choosing the right password

Comptia Security Plus ISO Model

Comptia Security Plus ISO Model, TCTIP Model, Hybird Model

How does ARP work? | ARP Commands

How does ARP work?, ARP Command

Suggested Cyber Resilience Activity Plan

Suggested Cyber Resilience Activity Plan

Ransomware and The Role of Cryptocurrency

Ransomware and The Role of Cryptocurrency