Page 46 - Cyber Safety C-8
P. 46

Threat Type               Definition                        Working                  Example
                   Malware           Malicious software is           Malware executes                 A computer
                                     intentionally developed         unauthorised code on a           virus that
                                     to infiltrate, damage, or       device, replicates or hides      modifies
                                     disrupt computer systems        itself, and performs harmful     system
                                     without the user’s informed     activities such as data          files and
                                     consent.                        corruption, surveillance, or     slows down
                                                                     unauthorised system control.     processing.

                   Ransomware        A category of malware that      It infiltrates systems via       The 2017
                                     encrypts a user’s data or       phishing or vulnerabilities,     WannaCry
                                     restricts system access,        encrypts critical data using     ransomware
                                     demanding a monetary            strong algorithms, and           attack
                                     ransom for restoration.         displays a ransom message        affected global
                                                                     demanding payment for the        institutions.
                                                                     decryption key.

                   Social            A psychological                 Exploits human trust, fear,      An attacker
                   Engineering       manipulation technique          or urgency by presenting         posing as
                                     used to deceive individuals     fake identities or situations,   a bank
                                     into divulging confidential or  leading individuals to reveal    representative
                                     sensitive information.          personal data or perform         to obtain
                                                                     harmful actions.                 OTPs.
                   Phishing          A deceptive communication  Uses counterfeit emails,              An email
                                     strategy where attackers        websites, or messages that       claiming
                                     send fraudulent emails or       look legitimate. Once the        accounts are

                                     messages to trick recipients  victim clicks a link and enters  “suspended”
                                     into revealing credentials or  data, the attacker captures       and asking
                                     financial information.          the information.                 users to log
                                                                                                      in through a
                                                                                                      malicious link.
                   Zero-day          Cyberattacks that exploit       Attackers identify unknown       Exploiting a
                   Threats           newly discovered software       vulnerabilities, create exploit   flaw in a newly
                                     vulnerabilities that            code, and use it before the      released

                                     developers are unaware of       organisation can develop and  web browser
                                     or have not yet patched.        distribute a security patch.     update.
                   Internal          Security risks originating      Insiders exploit legitimate      A disgruntled
                   (Insider)         from individuals within an      access privileges to steal,      employee
                   Threats           organisation who have           manipulate, or expose            is leaking
                                     authorised access but           sensitive information            confidential
                                     misuse it intentionally or      or to introduce security         client data.
                                     accidentally.                   vulnerabilities within systems.



                   44   Computer Science - VIII
   41   42   43   44   45   46   47   48   49   50   51