Adversaries

Common Cyber Threats

The digital landscape is populated by a diverse array of threats. From malicious software to manipulative psychological tactics, understanding the enemy is the first step in defense.

1 Malware: The Silent Invaders

"Malware" (Malicious Software) is an umbrella term for any code designed to harm a system.

Virus

Attaches itself to a clean file (host) and spreads to other files when the host program is executed. Requires human action to spread.

Worm

Standalone malware that replicates itself to spread to other computers. Unlike a virus, it does not need a host program or human help.

Trojan Horse

Disguises itself as legitimate software (e.g., a free game). Once installed, it opens a backdoor for attackers.

Ransomware

Encrypts a victim's data and demands payment (ransom) for the decryption key. A major threat to businesses today.

2 Social Engineering

Hacking the Human

Why spend days trying to break a complex firewall when you can just ask an employee for their password? Social engineering exploits human psychology rather than technical flaws.

Phishing

Deceptive emails aimed at tricking users into clicking links or downloading files.

Vishing

"Voice Phishing." Attackers call victims pretending to be IT support or bank staff.

Smishing

Phishing attempts sent via SMS text messages.

3 Network Attacks

DDoS Attacks

Distributed Denial of Service. Imagine 1,000 people trying to walk through a single door at the same time. The system crashes or becomes so slow it is unusable.

Goal: Disruption of Service

Man-in-the-Middle (MitM)

An attacker secretly intercepts and relays communication between two parties. It's like a mailman opening your letters, reading them, sealing them, and delivering them without you knowing.

Goal: Eavesdropping / Data Theft

4 Advanced Threats

Advanced Persistent Threats (APT)

Prolonged and targeted cyberattacks in which an intruder gains access to a network and remains undetected for an extended period. Often state-sponsored.

Insider Threats

Threats that originate from within the organization (employees, contractors). These are dangerous because they already have authorized access.

Constant Evolution

New threats emerge daily. Security is not a product you buy, but a process you maintain through vigilance, updates, and education.