Internet Security Threats
Botnets
A collection of software robots called zombies that may be remotely controlled, and they generate spam, attach viruses, and spread malware.
worm
A self-replicating malicious code. It spreads itself throughout the network and attaches to hard drives and external storage devices. It often causes extreme damage to network resources.
Pharming
A type of online fraud. It redirects a user to an illegitimate website by making the user believe the malicious site is legitimate, and then the user enters personal data.
Malware
Common methods for accessing network resources with malicious intent. It can delete files, steal sensitive information, and send questionable content messages from your address book, along with taking control of your computer and its resources.
Internet security
Focuses on preventing cyberattacks happening through the internet by concentrating on browser and network security.
risk
How likely you or your assets are of being attacked.
Hacking
Includes efforts taken by an individual to gain unauthorized access to a network.
Trojan Horses
Involve a software package used to masquerade malicious code. It involves a hidden executable file that installs and runs automatically after it is installed. It may delete files, activate resources such as a webcam, and may install spyware.
Viruses
Involves malicious code often received as an email attachment or downloaded as part of another program. It can be downloaded to a computer with the intent of infecting network resources.
Phishing
It involves the creation of fake emails, text messages, and websites created to duplicate a company's web presence. It's when trickery is used to entice you to enter personal and account information.
Spoofing
Often used with phishing attempts. It can employ a website or email address appearing to be legitimate. It may generate spam using your email address book. It can also resemble specific websites, such as a financial institution requesting login and password information.
Wi-Fi eavesdropping
Online monitoring technique used by cybercriminals to intercept and collect personal information over a Wi-Fi connection. It involves listening to a conversation or monitoring computer activity occurring over a non-encrypted Wi-Fi network.
Ransomware
Restricts access to computing resources displaying messages demanding payment to regain access. It may lock your screen access or may encrypt files and storage devices preventing access. If this happens, do not pay, instead contact an IT specialist to determine if computing resources can be repaired and data retrieved.
Intellectual property
The ownership of an individual's ideas or production. This includes artwork, music, movies, etc. and are protected by law.
Security
The precautionary steps taken to protect computing resources against cybercrime.
Computer security
The precautions taken to protect hardware and software components both in the private and commercial worlds.
threat
The presence of anything that can cause damage to your assets or anything you want to protect.
Spam
Unsolicited email or other unwanted correspondence transmitted to unsuspecting individuals. It's an annoyance and creates a burden on internet services. It provides an avenue for executing malware, fraud, phishing, and threats.
Spyware
Used to penetrate and reside within a computer. It collects personal information without your knowledge. It forwards collected passwords, accounts, and computer settings to unauthorized individuals.
vulnerability
Weaknesses or gaps in your protection efforts
Denial-of-service
When zombie computers saturate a server with unsolicited requests, and the flood of incoming requests forces the server to shut down.