- Home
- About Us & Project Introduction
- What Are "Cyber Security" and "Cyber Attack"?
- Why Does Cyber Security Matter?
- International and Local Cooperation on Cyber Attacks
- Simple Steps Towards Enhanced Cyber Security
- Educating the Public
- Video Reviews & Useful Resources
- Bibliography
- Acknowledgements
What are Cyber Security and Cyber Attack?
Definition of cyber security
Cyber security means protecting your personal information or any form of digital asset stored in your computer or in any digital memory device.
There are many different types of cyber attacks because of the increasingly fast development of digital media and technology. The different technologies that are a part of our daily lives have inherent weaknesses that allow for cyberattacks to be formulated and executed. The targets of these attacks are the three aspects of general computing:
Types of cyber attacks
The diversification of cyber attacks is a result of the growing complexities of machines and networks. Some of the significant ones are as follows:
You can read about each form of attack in detail on their respective pages. Click "Next" to begin. Next
Cyber security means protecting your personal information or any form of digital asset stored in your computer or in any digital memory device.
There are many different types of cyber attacks because of the increasingly fast development of digital media and technology. The different technologies that are a part of our daily lives have inherent weaknesses that allow for cyberattacks to be formulated and executed. The targets of these attacks are the three aspects of general computing:
- Communications - an organisation’s communications media, technology
- Networks - networking components, connections, and contents
- Information - information, its system and hardware
Types of cyber attacks
The diversification of cyber attacks is a result of the growing complexities of machines and networks. Some of the significant ones are as follows:
- Trojan Horses
- Computer Viruses
- Internet Worms
- Spamming
- Phising
- Denial of Service attacks
You can read about each form of attack in detail on their respective pages. Click "Next" to begin. Next