9Cyber Threats
A cyber threat is a computer or computer network hazard. It is a potential attack that preys on weaknesses or flaws in hardware and software systems. An exploit is defined as an unauthorized action performed on an information system such as a corporate network, desktop PC, enterprise server, website, factory control systems, SCADA network, or home computer. A zero‐day exploit is a previously unknown or unrecognized exploit. A remote exploit is an unauthorized access to an information system from a distance – from across a network. A person or group that carries out exploits is called an actor, black hat, or just plain criminal.
There are a number of highly varied types of threats ranging from malicious software designed to penetrate entire systems to phishing email exploits, designed to betray users into giving out personal information, and numerous other types of threats designed to cause a nuisance ...
Get Critical Infrastructure Resilience and Sustainability Reader now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.