Login

Cyber Threats: Definition & Types

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: Cyber Threats: Assessment & Analysis

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:04 What is a Cyber Threat?
  • 0:40 Trojans
  • 1:40 Worms
  • 2:42 Phishing
  • 3:13 Unpatched Software
  • 3:42 Lesson Summary
Add to Add to Add to

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Login or Sign up

Timeline
Autoplay
Autoplay
Create an account to start this course today
Try it free for 5 days!
Create An Account

Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Marcia Wert

Marcia has taught Information technology and Mathematics with a master's degree in IT

Explore types of cyber threats and how they affect us. We cannot guarantee that our private data is secure on the Internet. Too many threats exist out there! Let's see what we face on a daily basis when we log on.

What Is a Cyber Threat?

Cyber threats have existed since 1975 when Steve Jobs and Steve Wozniak invented the first personal computer, the Apple I. With the advent of personal computers came problems with hackers, people who want to gain unauthorized access to your personal information either for profit or to perform mischievous acts. A cyber threat is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners.

Let's investigate the types of cyber threats that exist and what damage they can accomplish on a network.

Trojans

The most common type of cyber threat is the trojan, which is a program or coded instructions for a specific task that appears harmless. However, the trojan is in fact trying to secure data for malicious purposes. Have you ever heard on the news about a big business getting attacked by hackers and losing a bunch of customer information? This is sometimes the result of a trojan.

For example, you visit a website and are told that your computer is infected with a computer virus or needs files to be cleaned up. You are prompted to install free software that will clear the infected files, but it might not be as free as you think. The trojan creates a file on your computer - it might be an Adobe or Word document. The program then gathers your keystrokes, or the words you type, and compiles them into that one document. The document is then transmitted to the hacker. Since business organizations compile very sensitive financial data, this can cost you or your company millions.

Worms

A worm is a standalone program, one that runs from its own executable, which is a type of program or file. A worm replicates itself onto other computers within a network or a system of computers connected together. It does not need to attach itself to another existing executable file or program like other cyber threats do. Most worm programs are compiled and run as file type .exe, short for 'executable.' The user within the network will click on an executable file in an attachment, thinking it is harmless. It is then that the worm will start to replicate itself.

The latest version of worms are the network variety. These programs populate (attack) multiple different users within a network rather than just one. As you can imagine, worms are hard to detect. Blocking or scanning such attachments is a good security measure as well as training employees to not click on any file attachments that have the .exe extensions.

To unlock this lesson you must be a Study.com Member.
Create your account

Register for a free trial

Are you a student or a teacher?
I am a teacher

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back

Earning College Credit

Did you know… We have over 95 college courses that prepare you to earn credit by exam that is accepted by over 2,000 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it free for 5 days!
Create An Account
Support