BUAW-L7-How-to-Identify-Cyber-Risks-Information-Sheet
BUAW-L7-How-to-Identify-Cyber-Risks-Information-Sheet
BUAW-L7-How-to-Identify-Cyber-Risks-Information-Sheet
The following are examples of common cyber attacks though it is not an exhaustive list as cyber
criminals are constantly evolving their methods. Organisations therefore need to be aware of cyber
risks and use a range of cyber security practices to protect themselves from cyber attacks.
Malware attacks are any type of malicious software designed to cause harm or damage to a
computer, server or computer network and/or infrastructure without the end user's knowledge.
Cyber attackers create, use and sell malware for many different reasons, but usually it is to steal
personal, financial or business information.
Phishing is a form of cyber attack when the attacker tries to trick the user into clicking on a bad link.
Once clicked, the link might download a virus or go to a fake website that can then be used to steal
sensitive and/or financial information. Phishing is most commonly done by email but can also be
attempted by text messages, social media, or phone calls. It is not strictly illegal but is unlawful, as
it’s designed to trick users into supplying information, like passwords and bank account details.
A computer virus is malicious software, also known as malware, that causes damage to data and
software by spreading between computers. Viruses can change, destroy and lock systems so they
can’t be used. They can also result in the loss of data. Phishing can be used as a way of getting a virus
into a system as they are designed to start working once the file they are in has been opened. The
virus can then spread from the initial file via networks, drives, file-sharing programs and infected
email attachments. It is illegal to make changes to data kept on a computer system without
permission.
Hacking occurs when an unauthorised user breaks into a computer system. Often this is done in
order to change, destroy or steal data. Phishing can be used as a way for hackers to gain access to
software. Although it can also be done directly if computer systems are not protected by a firewall. It
is illegal to access data kept on a computer system without permission.
Ransomware is a specific type of malware that, once activated, prevents the user from interacting
with their files, applications or systems until a ransom is paid, usually in the form of an untraceable
cryptocurrency. The user may be instructed to pay the perpetrator by a set time or risk confidential
information being exposed or losing access permanently. Ransomware can be particularly disruptive
to operations, especially when the ransom is not paid and the company involved has to rebuild all its
data again to function properly.
Online Lesson 7 -
1
Business Awareness
© Mindful Education Ltd
Keylogging is when the keystroke entries made on a computer are tracked and recorded without the
user's permission or knowledge. This is done via keylogger tools, which can be either hardware or
software, that record the data sent by every keystroke into a text file. Keyloggers can be used
legitimately for personal or professional IT monitoring, however, some uses can be seen as unethical
and others are definitely criminal.
Spyware can be defined as malicious software designed to enter a computer device, gather data and
forward it to a third party without the user’s consent. It can also refer to legitimate software that
monitors data for commercial purposes like advertising. However, malicious spyware is explicitly used
to profit from stolen data. Regardless of whether the spyware is legal or not, its use leaves
organisations open to data breaches and the misuse of confidential information. Spyware also affects
network and device performance, slowing down daily user activities.
A brute force attack is a hacking method that uses trial and error to crack passwords, login
credentials, and encryption keys. It is a simple yet reliable tactic for gaining unauthorised access to
individual accounts and organisations’ systems and networks. The hacker tries multiple usernames
and passwords, often using a computer to test a wide range of combinations, until they find the
correct login information.
When a browser has been hijacked, a malware program has modified the web browser settings
without the user's permission. This can change the browser’s behaviour, setting and appearance. The
malware can redirect the user to websites the user had not intended to visit and install adware (that
shows unwanted pop-up adverts), spyware, and other types of malware.
Password attacks occur when hackers attempt to access a file, folder, account, or computer secured
with a password. It’s generally done with software that cracks or guesses passwords. Password
attacks usually happen in conjunction with phishing, brute force attacks or keylogging. Password
attacks can be prevented by enforcing strong password policies, activating two-factor authentication,
using a password manager and training staff on the importance of password security.
Online Lesson 7 -
2
Business Awareness
© Mindful Education Ltd