THREATS

Everything to know about cyber threats.

FAQ

What is a cyber threat?

A cyber threat is “any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service.”

Who are the attackers?

Corporate Spies

Criminal Groups

Hacktivists

Malicious Hackers

Malicious Insiders

Nation-state attackers

Terrorist Groups

What do they attack?

Data

Infrastructure

Network

Why do they attack?

Financial gain / Profit

Reputation enhancement

Seek revenge

Espionage Political Damage

Economic Damage

Cyber Warfare

Social Awareness

Ideological

Publicity

Propaganda

Geopolitical

Satisfaction

Discontent

ADVERTISEMENT

TYPES OF THREATS

APT

0
SHARES
0
VIEWS

An APT is a cyber attack launched against a specific company, person or institution. These attacks are usually deployed by well-trained attackers using advanced technology, strategic tactics and the necessary (financial) resources. APTs are well-structured and complex.

Read more
ADVERTISEMENT
0
SHARES
0
VIEWS

5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices. 5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra low latency, more reliability,...

Read more
ADVERTISEMENT
0
SHARES
0
VIEWS

Short for “malicious software”. It is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Read more
ADVERTISEMENT
0
SHARES
0
VIEWS

In spear phishing, a criminal specifically targets an individual or an organization, trying to obtain specific pieces of information, often with a specific end goal in mind.

Read more
ADVERTISEMENT

DoS / DDoS ATTACKS

0
SHARES
0
VIEWS

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as...

Read more

Welcome Back!

Create New Account!

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist