Click here to load reader
Upload
statewide-insurance-brokers
View
47
Download
1
Embed Size (px)
Citation preview
We cover 10 types of cyber attacks
Cyber event protection
Point of Sale (POS) intrusionsWhere retail transactions are conducted, specifically where card – present purchases are made.
Cyber ExtortionCrime involving an attack or threat of attack against your IT infrastructure , couple with demand for money to stop the attack.
Miscellaneous ErrorsPeople make mistakes! Unintentional actions directly compromised a security attribute of an information asset.
Cyber EspionageUnauthorised network or system access linked to state affiliated actors and / or exhibiting the motive of espionage.
Denial of ServiceIntended to compromise the availability of networks and systems. Includes both network and application layer attacks.
Physical Theft and LossAny incident where an information asset went missing, whether through misplacement or malice.
Insider and Privilege MisuseAny unapproved or malicious use of organisations resources. Mainly insider misuse or external (through collusion)
Web App AttacksThis includes exploits of a code – level vulnerabilities in the application as well as thwarting authentication mechanisms.
Payment Card SkimmersWhere a skimming device is physically implanted on an asset that reads magnetic stripe data from a payment card
CrimewareA form of malware. Primary goal is to gain control of systems to steal credentials