You are on page 1of 5

CYBER

THREATS
PRESENTED BY RIDA RAZIQ
BS ENGLISH (1ST SEMESTER)
CYBER THREATS:
 A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or
disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of
Service (DoS) attacks, and other attack vectors.

 Cyber threats also refer to the possibility of a successful cyber attack that aims to gain
unauthorized access, damage, disrupt, or steal an information technology asset, computer
network, intellectual property, or any other form of sensitive data. Cyber threats can come
from within an organization by trusted users or from remote locations by unknown parties.
TYPES OF CYBER THREATS :
 Common cyber threats include:
 MALWARE:
 ‍Malware (malicious software) is software that has been specifically designed to perform malicious
tasks on a device or network, such as corrupting data or taking control of a system.
 SPYWARE:
 ‍Spyware is a form of malware that hides on a device providing real-time information sharing to its
host, enabling them to steal data like bank details and passwords. Spyware is not just one type of
program. It is an entire category of malware that includes adware and Trojans.
 PISHING ATTACKS:
 ‍Phishing attacks are when a cybercriminal attempts to lure individuals into providing sensitive data
such as personally identifiable information (PII), banking and credit card details, and passwords.
Distributed Denial of Service (DDoS) Attacks
‍ istributed denial of service attacks aims to disrupt a computer network by flooding the
D
network with superfluous requests from a botnet to overload the system and prevent
legitimate requests from being fulfilled.

Ransomware
Ransomware is a type of malware that denies
access to a computer system or data until a ransom
is paid. Ransomware is one of the most dangerous
types of cybersecurity threats.
Some ransomware attack techniques involve
stealing sensitive information before the target system
is encrypted. Such added processes could classify some
ransomware attacks as data breaches.
REFERENCE:
 https://www.upguard.com/blog/cyber-threat
 https://www.mass.gov/service-details/know-the-types-of-cyber-threats

You might also like