Cyber Threats

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

undefined. Cyber Threats.

Page 2 (35s)

undefined. Cyber Threats Malware Phishing attacks Ransomware DDoS attacks Insider threats Social engineering SQL Injection.

Page 3 (49s)

[Audio] Cyber threats refer to malicious activities or potential dangers and it will exploit by find the week point in our computer systems, networks, and digital infrastructure. These threats are executed with the intent to compromise the confidentiality, integrity, or availability of information, disrupt operations, or gain unauthorized access to sensitive data. Cyber threats can take various forms and may target individuals, organizations, or even entire nations..

Page 4 (1m 22s)

[Audio] Malware is the Malicious software designed to harm or exploit computer systems. This includes viruses that replicate, worms that spread, Trojans that disguise themselves, ransomware that encrypts data for ransom, and spyware that steals information..

Page 5 (1m 40s)

Infects host files which sometimes damage host file forever Spreads when infected files are unknowingly shared Remains hidden from the user.

Page 6 (1m 51s)

Replicates on its own by creating copies of itself spreads through network and external drives..

Page 7 (2m 1s)

Disguised as legitimate software Doesn’t spread on its own It can Disrupt the normal functioning of a machine Hide itself and other malwares Act as a backdoor to RAT Send spam emails.

Page 8 (2m 14s)

Aka scareware Makes user’s system inaccessible and requires a payment to get unlocked.

Page 9 (2m 24s)

Employs social engineering tricks Spoofs legitimate site’s login page, get credentials from the users Sends credentials to malware authors.

Page 10 (2m 36s)

It involves a cybercriminal flooding a server with internet traffic, aiming to obstruct users from accessing connected online services and websites.

Page 11 (2m 46s)

Intentional or unintentional mistakes by employees jeopardizing security. These insider actions can lead to financial losses, reputational damage, operational disruptions, and data breaches..

Page 12 (2m 58s)

It’s the art of manipulating, so they give up the confidential information. Preparation Infiltration Exploitation Disengagement.

Page 13 (3m 7s)

Taking advantage of weaknesses in a website or application's database by introducing harmful SQL code, which may result in unauthorized access or manipulation of the database..

Page 14 (3m 20s)

Strong and unique passwords Regular software updates Use of firewalls and antivirus software Data encryption Multi-factor authentication.