1 understanding cyber threats
TRANSCRIPT
![Page 1: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/1.jpg)
Understanding CyberThreats
![Page 2: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/2.jpg)
Possibility of or attempt of gaining unauthorized "access to a device or system or network using a data communication pathway
![Page 3: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/3.jpg)
The 10 most common Cyber Threats
Malware malicious software computer viruses, worms, Trojan horses,
dishonest spyware, and malicious rootkits
![Page 4: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/4.jpg)
Computer virus small piece of software that can spread from
one infected computer to another corrupt, steal, or delete data on your
computer
![Page 5: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/5.jpg)
Rogue security software pop-up window that advertises a security
update or alert on your computer screen
![Page 6: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/6.jpg)
Trojan horse infect their computers with Trojan horse
software simply by downloading an application they thought was legitimate but was in fact malicious
![Page 7: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/7.jpg)
Malicious spyware used to describe the Trojan application that
was created by cybercriminals to spy on their victims
![Page 8: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/8.jpg)
Computer worm software program that can copy itself from
one computer to another, without human interaction
replicate in great volume and with great speed
![Page 9: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/9.jpg)
Botnet Group of computers connected to the
Internet that have been compromised by a hacker using a computer virus or Trojan horse
![Page 10: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/10.jpg)
Spam security context is primarily used to
describe email spam unwanted messages in your email inbox clutter your mailbox as well as potentially
take up space on your mail server
![Page 11: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/11.jpg)
Phishing Fraudulent attempts by cybercriminals to obtain
private information Often appear in the guise of email messages
designed to appear as though they are from legitimate sources
![Page 12: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/12.jpg)
Rootkit collection of tools that are used to obtain
administrator-level access to a computer or a network of computers
![Page 13: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/13.jpg)
Who Are the Culprits Behind Cyberthreats?
![Page 14: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/14.jpg)
![Page 15: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/15.jpg)
How Do Cyberattacks Affect your Organization?
When your Organization is robbed digitally … the pool
of suspects is limited to the number of people on the
face of the earth that have a laptop and an Internet
connection, because anybody with an Internet
connection potentially can attack any other computer
that's tied to the network.
So the barrier of entry is relatively low.
![Page 16: 1 understanding cyber threats](https://reader036.vdocuments.mx/reader036/viewer/2022062406/55c5c7efbb61eb5d748b45e4/html5/thumbnails/16.jpg)
Your organization not only suffer direct financial losses due to cyberattacks but they also face enormous costs when they are victimized by large-scale data breaches following these attacks.
These costs include but are not limited to: Investigation and forensic costs
Customer and partner communications costs
Public relations costs
Lost revenue due to a damaged reputation
Regulatory fines
Civil claims and legal fees