CYT - Cybersecurity Threats (Overview)
Cybersecurity Threats
Introduction
In this module, you will learn about various types of malicious software, known as malware. You will also learn how malware impacts our lives and what best cybersecurity practices can be used to mitigate the risk and impact of malware.
Learning Questions
- Identify the types of malicious software.
- Examine how malware has a negative impact on a computer system.
- Discuss best cybersecurity practices.
Key Terms
Advanced Persistent Threat (APT): an attack that uses sophisticated methods to establish a presence on a system or network for an extended period of time.
Adware: software that installs advertisements on the PC in the form of toolbars or pop-ups or banners.
Backdoor: program that creates a mechanism for gaining access to a computer, by leaving a port open or creating a bogus user with privileges.
Keylogger: a type of surveillance software or hardware device designed to record and log every keystroke made on a keyboard.
Logic Bomb: a small program that is timed to perform an operation on a system.
Malware: malicious software.
Phishing: a cyber attack where scammers use deceptive emails, messages, or websites to trick individuals into revealing sensitive information, such as passwords, credit card details, or personal identification numbers.
Potentially Unwanted Program or Application (PUP or PUA): programs that may be unwanted on the PC and often come bundled with freeware programs.
Ransomware: type of malware designed to block access to a computer system or encrypt its data until a ransom is paid.
Root Kit: a group of programs installed by an attacker to gain complete control of a computer.
Spyware: software that gathers data and forwards it to a third party without the consent or knowledge of the user.
Trojan: file that appears to be a legitimate program but it contains malicious code.
Virus: a program that attaches to a host file with the goal of installing itself on a system.
Worm: a program that reproduces itself and can transport from system to system without attaching to a file.
Zero Day: an attack that takes advantage of code flaws that have VERY recently been discovered.
[CC BY-NC-SA 4.0
Links to an external site.] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION - INTENDED ONLY FOR USE WITHIN LESSON.