About This Chapter
The Cybersecurity Threat Landscape - Chapter Summary
The cybersecurity threat landscape covers various attacks in digital crime, computer viruses, digital crime espionage and more. To ensure you fully understand this landscape, study bite-sized lessons developed by expert instructors. They provide an engaging examination of these and other concepts to offer the overview you need. As you study the lessons, you can easily find out how well you comprehend main concepts by taking the accompanying multiple-choice quizzes and chapter exam. We offer a dashboard that keeps track of your progress and lets you submit any questions about specific lesson topics to our subject-matter experts. By the end of this chapter, you will be more than ready to:
- Define and list types of cybersecurity vulnerabilities
- Explain how human error can lead to digital attacks
- Identify types of attacks in digital crime
- Share the meaning of a computer virus and discuss different types
- Differentiate between espionage and vandalism in digital crime
1. Cybersecurity Vulnerabilities: Definition & Types
Cybersecurity vulnerabilities and threats to cybersecurity are real issues confronting both individuals and businesses. In this lesson, you'll learn more about both and some common types of vulnerabilities.
2. How Human Error Leads to Digital Attacks
Although human error may not be a crime, it may cause a vulnerability that could result in a digital attack. In this lesson, you'll learn more about types of human error and how each can create cyber vulnerabilities.
3. Attacks in Digital Crime: Definition, Types & Vulnerability
In this lesson we will understand what digital crime is. We will examine the four main types of digital crimes. Crimes are successful because vulnerabilities are exploited. We will look into the different types of vulnerabilities that make our systems and data susceptible to cyber attacks.
4. What is a Computer Virus? - Definition, Types & Protection
In this lesson, we'll discover the nature of computer viruses and how they are commonly spread. We'll look at the types of viruses, protection schemes, and some real-life examples.
5. Espionage in Digital Crime: Definition & Types
Cyber espionage targets individuals or organizations from which top-secret information can be stolen. In this lesson, you'll learn more about cyber espionage and what these thieves are hoping to gain as a result.
6. Vandalism in Digital Crime: Types & Evidence
Vandalism in digital crime typically seeks to wreak havoc and destroy data rather than steal and misuse it. In this lesson, you'll learn more about cybervandalism and what it looks like in its various forms.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 332: Cybersecurity Policies and Management course
- Intro to Cybersecurity
- Information Security Policy
- Information Security Strategy Development
- Cybersecurity Policy, Governance & Management
- Cybersecurity Risk Management
- Data Access Control
- Partner & Vendor Security Management
- Security Awareness Training
- Information Security Compliance
- Information Security Performance Metrics
- Required Assignments for Computer Science 332