Phishing
Most common and effective form of internet fraud
To reach information which are useful to cybercriminals (password, card number, identity data)
Spear phishing
More time to prepare message based on open-source intelligence
Uses information from the internet to look similar like original
Message have pressure inside, “Immediately”, “urgent”, to not give time for thinking
Ways of phishing
Mails: Lead to fake website
MS Teams: Persuade to click onto fake links Voice communication: reaching confidential data
SMS: Sent by GSM network or by messenger, include links which reach your login data
Fake application: Spy your actions and files or take over the device
Social media: Build relationship to steal money or they pretend to be other persons
Ways of company attacks
Insiders: Employees who would like to attack the company
Accidental: Person who by accident clicks the link of phishing mails
Negligent: Person who ignores internal trainings or insert company data in external share points
Malicious: Person take the know-how and sell it to the competition
Malware
Most common threats on the internet
Goal: Reach access to computer and information
Examples: Viruses, trojans and spyware
Ransomware
Special kind of malware
Goal: encrypt and/or steal confidential data
Hackers request ransoms to unlock or don’t send to public information
DDoS attack
Based on server overload with huge usage
Can paralyze actions on websites for few hours or even days
Done to banks, governments websites, internet shops, companies, standard blogs
Malvertising
Ads are used to distribute malicious code
Looks like standard one, after you click on it a malicious code can be activated
Spoofing
Attack were fraudster pretend to be someone else
To persuade to provide login data, to install malicious software or other important information
Watering hole attacks
Based on a special crafted website which is visited by individuals group (dedicate to one industry)
Man-in-the middle attack
Based on interception and potential modification of the data during the transmission between 2 sides without their awareness
Criminals might intercept login data or payments information
Information systems
For issue solving
Based on computers
Implemented in 20. century
Main parts: storage, process and transmission
ERP
= Enterprise resource planning
MRP
= Material requirement planning
MRP II
manufacturing resource planning
Robotization
Robots or accompanying devices to perform process operations with limited or no human intervention
Automation
Reduce or replace physical and mental work by machines operation on the principle of self-regulation and performing specific activities (wider that robotization)
Industrial automation
Robots make monotonous activities
Service automation
Support humans in non-physical work
RPA
= Robotic process automation
Making business process without human interference
AI
= Artifical Intelligence
Systems that display intelligent behavior by analyzing their environment and taking actions with some degree of autonomy to achieve specific goals
Purley software based, acting in virtual world or embedded in hardware devices
Main fields: Image recognition, processing technologies, language processing technologies, virtual assistants, autonomous robots / codes, machine learning
Last changeda year ago