Tag: Phising

  • Introduction to cyber security – Week 3, Malware

    Viruses Inserts copies of itself onto crucial parts of hard disk in applications and data. They are self-replicating and either start when the infected application starts each time or after starting once copy themselves and start each time the computer starts. Mainly written to harm users by destroying data, creating backdoors which can be exploited.…

  • Introduction to cyber security – Week 1, Threat Landscape

    Terminology CIA – guiding principal Confidential – only to be read by right people Integrity – only changed by authorised people/processes Availability – available to read/use whenever we want Information assets Information asset could be customer data amongst other things Authentication – necessary to verify identity of source of request of information. Non-repudiation – ensuring…