Cyber Security
BY: ZACHARY CLAUSEN
Types of Attacks/Malware
Social Engineering
Trojan Horse
Worm
Ransomware
Adware
Spyware
Image Credit: enzozo /Shuttershock
Social Engineering
Steal Information by:
Impersonating an employee
Sneaking into the building and gathering employee
information
Dumpster dive for sensitive information not properly
disposed of
Trojan Horse Virus
These are malware that disguise themselves as an innocent
looking programs so you download them.
They can do a wide variety of things such as:
Damage systems
Copy data
Delete data
Block data
Worm
Worms are viruses that don’t require the aid of a human to
replicate or help infect other systems. All they do is look for
a vulnerability and enter through it. They are viruses that
are:
Self replicating
Self transmitting
Ransomware
Ransomware is a malware that holds the data on a system
hostage until an action is performed. It can be to pay a
certain account a sum of money or perform a certain task.
What is certain is the data held hostage can be:
Deleted
Sold
Copied
Adware
Adware is a malware that forces ads to be downloaded or
displayed without the users consent.
It can redirect you to a site where ads are heavily present
and often not the site you initially wanted to go to.
It gathers information on the user without the users
knowledge or consent.
Spyware
A malware that secretly gathers information about a user
or system and sends it somewhere.
Information can be what’s on the hard drive or it can be
what the user does.
It can track keystrokes to gather data on what you
typically type which can lead to what passwords you use.
Protection/Prevention
Digital Physical
Firewalls Cameras
Regular system scans Electronic locks
Up-to-date security Security guards
Two-factor authentication Electronic badges
Turnstiles
Two door access rooms
Protocols in employee handbook
Image Credit: popetech
References
Engel, K., & Harvey, J. W. (2010, June 01). Influence of Awareness and Training on Cyber Security. Retrieved February 09,
2018, from Web.
Granger, S. (2001, December 18). Social Engineering Fundamentals, Part I: Hacker Tactics. Retrieved February 9, 2018,
from Web.
Hutcheson, D. (2007, June 19). Business Risks and Security Assessment for Mobile Devices . Retrieved February 09, 2018,
from Web.
Thompson, S. T. (2006, December 01). Helping the Hacker? Library Information, Security, and Social Engineering. Retrieved
February 10, 2018, from Web.
Woszczynski, A. B., & Green, A. (2017). Learning Outcomes for Cyber Defense Competitions. Journal Of Information
Systems Education, 28(1), 21-41.