1. Digital Security Risks - is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information or processing capability. Examples of Digital Security Risks: 1. Computer viruses – are pieces of software that are designed to be spread from one computer to another. 2. Rogue security software – is malicious software that mislead users to believe there is a computer virus installed on their computer or that their security measures are not up to date. 3. Trojan Horse – refers to tricking someone into inviting an attacker into a securely protected area. 4. Computer worms – are pieces of malware programs that replicate quickly and spread from one computer to another. 5. Dos attack – is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. Cybercriminals - Include members of extremist and radical groups at both ends of the political spectrum who use the Internet to spread propaganda, attack the Web sites and networks of their political enemies, steal money to fund their militant activities, or plan and coordinate “real-world” crimes. Examples of Cybercriminals: 1. Phishing scams – is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information from a computer user. 2. Online Harassment – can consist of threats sent through email, instant message or through a social network message or post. 3. Cyberstalking – is also known to continually harass their potential victims/ 4. Invasion of Privacy – is basically the act of someone attempting to intrude on a person’s personal life. 5. Identity theft – occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefits. Malware - Is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. - Is based on its intended use, rather than a particular technique or technology used to build it. Examples of Malware 1. Virus – are designed to damage he target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system. 2. Worm – spread over computer networks by exploiting operating system vulnerabilities. 3. Adware – is often known for being an aggressive advertising software tat puts unwanted advertising on your computer screen. 4. Ransomware – is a type of malware that holds your data captive and demands payment to release the data back to you. 5. Spyware – is designed to track your browsing habits and internet activity. Botnets - Are a collection of internet-connected devices infected by malware that allow hackers to control them. - It is used to instigate botnet attacks, which include malicious activities. Examples of Botnet 1. Distributed Denial of Service (DDoS) – cause unplanned application downtime. 2. Validating lists of leaked credentials – leading to account takeovers. 3. Web application – attacks to steal data. 4. Providing an attacker access to a device and its connection to a network. Spoofing Is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms, primarily: 1. Email spoofing 2. Website and/or URL spoofing 3. Caller ID spoofing 4. GPS spoofing 5. Man-in-the-middle attacks Denial of service attacks - Is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. Popular flood attacks 1. Buffer overflow attacks – the concept is to send more traffic to a network address than the programmers have built the system to handle. 2. ICMP Flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine. 3. SYN flood – sends a request to connect to a server, but never completes the handshake. Back doors - Is a malicious code which, by exploiting system flaws and vulnerabilities, is used to facilitate remote unauthorized access to a computer system or program. Examples of Back doors: 1. Cryptojacking malware is designed to use your system's resources to mine cryptocurrency. In short, every time someone exchanges cryptocurrency the transaction is recorded on an encrypted virtual ledger known as the blockchain. 2.