Cyber Threats

Cyber threats are malicious actions or events that attempt to steal data, disrupt systems, or gain unauthorized access to computers and networks.

1️⃣ What Is a Cyber Threat?

A cyber threat is any attempt to:

  • Steal information
  • Damage systems
  • Disrupt services
  • Spy on users or organizations

Threats can target:

  • Individuals
  • Businesses
  • Governments
  • Critical Infrastructure

2️⃣ Common Cyber Threats (Beginner Level)

🎣 Phishing

Phishing is when attackers trick users into revealing sensitive information by pretending to be a trusted source.

Examples:

  • Fake emails from banks
  • “Urgent” account security messages
  • Fake login pages

Warning Signs:

  • Urgent language
  • Unexpected attachments
  • Suspicious links
  • Poor grammar or odd sender addresses

Basic Defense:

  • Don’t click unknown links
  • Verify the sender
  • Report suspicious emails

🦠 Malware

Malware is malicious software designed to harm or control systems.

Common Types:

  • Viruses
  • Trojans
  • Spyware
  • Keylogger

What Malware Can Do:

  • Steal passwords
  • Monitor activity
  • Damage files
  • Create backdoors

Basic Defense:

  • Keep systems updated
  • Use antivirus software
  • Avoid pirated software
  • Don’t download files from uknown sources

🔐 Ransomware

Ransomware locks files or systems and demands payment to restore access.

How It Spreads:

  • Phishing emails
  • Malicious downloads
  • Unpatched systems

Impact:

  • Loss of access to data
  • Production downtime
  • Financial loss

Basic Defense:

  • Regular backups
  • Patch systems
  • Be cautious with email attachments

🧾 Credential Theft

Attackers steal usernames and passwords to access accounts.

Methods:

  • Phishing
  • Data breaches
  • Keylogging malware

Impact:

  • Account takeover
  • Identity theft
  • Financial fraud

Basic Defense:

  • Use unique passwords
  • Enable MFA
  • Use a password manager

🌐 Man-in-the-Middle (MITM) Attacks

Attackers intercept communication between two parties.

Common Locations:

  • Public wi-fi
  • Unsecured networks

Impact:

  • Stolen credentials
  • Session hijacking

Basic Defense:

  • Use HTTPS websites
  • Avoid public Wi-Fi for sensitive tasks
  • Use a VPN

🧠 Social Engineering

Social engineering exploits human trust, not technical flaws.

Examples:

  • Fake tech support calls
  • Impersonation emails
  • Urgent requests from “management”

Basic Defense:

  • Slow down
  • Verify requests
  • Follow company procedures

3️⃣ Insider Threats

Not all threats come from outsiders.

Insider threats involve people within an organization:

  • Negligent employees
  • Disgruntled staff
  • Contractors with too much access

Basic Defense:

  • Least privilege access
  • Security awareness training
  • Monitoring and logging

4️⃣ Denial-of-Service (DoS / DDoS)

These attacks overwhelm systems so users cannot access services.

Impact:

  • Website downtime
  • Service outages
  • Lost revenue

Basic Defense:

  • Traffic filtering
  • Rate limiting
  • DDoS protection services

5️⃣ How Cyber Threats Impact the CIA Triad

Threat Confidentiality Integrity Availability
Phishing
Malware
Ransomware
DDoS
Insider Threats