25 Oct / Cyber Attack Glossary
Below is an overview of some of the most common Cyber Attack methods and terms to help your business stay prepared for the digital age. In the last few years there have been major advanced to protect your business from Cyber Attack, especially in Insurance. Learn more about Cyber Insurance and how we can help protect your business.
Exploit A malicious application or script that can be used to take advantage of a computer’s vulnerability.
Data Breach The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Firewall A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
Malware An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
Virus A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
Ransomware A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
Trojan horse A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
Worm A piece of malware that can replicate itself in order to spread the infection to other connected computers.
Bot or Botnet A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
DDoS An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).
Phishing or Spear Phishing A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.