Cyber Threats (continued)
Phishing is a technique that is used to extract personal information from the user- it often comes in the form of a legitimate email that asks the user to click a link. Once the user clicks this link, they are directed to a fake website that asks them to enter personal information (this link could even prompt a virus to download)(spoofing).
Spear phishing is like phishing, but the suspicious email actually comes from someone you know, which makes the so called “email” more trustworthy.
DDoS (Distributed Denial of Service) is when a hacker overwhelms or floods a website with too many requests, thus temporarily shutting off access for users.
It is human nature for us to be trusting, and helpful- hackers can take advantage of this and pretend to be a company that aims to help people, but in reality they are trying to scam you (social engineering).
Now that we know about some of the threats that hackers and cyber attacks can pose, we will start to understand the principles behind stopping these threats.
Back