Page 46 - Cyber Safety C-8
P. 46
Threat Type Definition Working Example
Malware Malicious software is Malware executes A computer
intentionally developed unauthorised code on a virus that
to infiltrate, damage, or device, replicates or hides modifies
disrupt computer systems itself, and performs harmful system
without the user’s informed activities such as data files and
consent. corruption, surveillance, or slows down
unauthorised system control. processing.
Ransomware A category of malware that It infiltrates systems via The 2017
encrypts a user’s data or phishing or vulnerabilities, WannaCry
restricts system access, encrypts critical data using ransomware
demanding a monetary strong algorithms, and attack
ransom for restoration. displays a ransom message affected global
demanding payment for the institutions.
decryption key.
Social A psychological Exploits human trust, fear, An attacker
Engineering manipulation technique or urgency by presenting posing as
used to deceive individuals fake identities or situations, a bank
into divulging confidential or leading individuals to reveal representative
sensitive information. personal data or perform to obtain
harmful actions. OTPs.
Phishing A deceptive communication Uses counterfeit emails, An email
strategy where attackers websites, or messages that claiming
send fraudulent emails or look legitimate. Once the accounts are
messages to trick recipients victim clicks a link and enters “suspended”
into revealing credentials or data, the attacker captures and asking
financial information. the information. users to log
in through a
malicious link.
Zero-day Cyberattacks that exploit Attackers identify unknown Exploiting a
Threats newly discovered software vulnerabilities, create exploit flaw in a newly
vulnerabilities that code, and use it before the released
developers are unaware of organisation can develop and web browser
or have not yet patched. distribute a security patch. update.
Internal Security risks originating Insiders exploit legitimate A disgruntled
(Insider) from individuals within an access privileges to steal, employee
Threats organisation who have manipulate, or expose is leaking
authorised access but sensitive information confidential
misuse it intentionally or or to introduce security client data.
accidentally. vulnerabilities within systems.
44 Computer Science - VIII

