An important part of protecting your company's data and cyber security risk is by understanding how your data and your information technology systems can be vulnerable.

Hacks can occur in unexpected ways, and the cyber world has its own terminology for each one. You may have heard of "phishing," but how many of these other, newer terms are you familiar with? More importantly, is your data and IT system secure from all of them?

According to Chris Hauser, second vice president for Travelers Investigative Services's Cyber Program, there are a few essential terms describing how data breaches can occur and how confidential information can be obtained that every business should know.

Let us know in the comment section below if there are other terms you've come across that you'd like to share with readers.

You're invited to join us on Facebook!

Network-of-computers-with-abstract-people-crop-738x415-ThinkstockPhotos-138108046-Tom De Spiegelaere

(Photo: Thinkstock)

1. Botnets

Botnets are large networks of infected computers (sometimes called bots) under the control of a computer hacker. Hackers can use the distributed computing capabilities of botnets to send millions of spam emails, launch distributed denial-of-service attacks, conduct widespread theft of banking credentials, enable the mass installation of ransomware, and many other activities.

Access-denied-on-laptop-monitor-crop-738x415-ThinkstockPhotos-506466727-Bratovanov

(Photo: Thinkstock)

2. Denial of service and distributed denial-of-service

In these malicious attacks, hackers interrupt a website or computer network to prevent a company or its customers from accessing it.

According to Techopedia, a distributed denial-of-service (DDoS) is a type of computer attack that uses a number of hosts to overwhelm a server, causing a website to experience a complete system crash. This type of denial-of-service attack is perpetrated by hackers to target large-scale, far-reaching and popular websites in an effort to disable them, either temporarily or permanently. This is often done by bombarding the targeted server with information requests, which disables the main system and prevents it from operating. This leaves the site's users unable to access the targeted website.

DDoS differs from a denial-of-service (DOS) attack in that it uses several hosts to bombard a server, whereas in a DoS attack, a single host is used.

Young-man-at-work-using-computer-view-over-shoulder-crop-ThinkstockPhotos-200334039-001-Christopher Robbins

(Photo: Thinkstock)

3. Internal threats

Employees can be the weakest link in an organization's defenses. Costly errors and intentional malicious activity can lead to serious consequences, including the loss of sensitive data, financial theft and unauthorized access to network resources.

The best way to prevent cyber incidents by employees is to ensure that they are trained to be continually aware of the seriousness of protecting the company's data.

Backend-source-codes-on-computer-monitor-crop-ThinkstockPhotos-510245477-KeremYucel

(Photo: Thinkstock/KeremYucel)

4. Exploits

Malware relies on flaws in computer software and hardware to function.

Sometimes a programming mistake can be exploited to gain escalated privileges, install additional malware or instruct a computer to perform unintended commands. Malicious code that takes advantage of these weaknesses are often termed "exploits."

Anonymous-Hacktivist-Mask-crop-ThinkstockPhotos-497943046-sinvuka

(Photo: Thinkstock)

5. Hacktivists

Hacktivists wreak havoc on a company's or organization's website or systems to promote a social or political cause.

The best known hacktivist group is Anonymous, described by USA Today as "an amorphous group of hacker activists who have inserted themselves into several conflicts worldwide. There is no one Anonymous group but rather several individuals and groups that make statements and take action under the broad umbrella of the name." Anonymous has made claims that will destroy ISIS through its hacking activities.

smartphone-payment-500-crop

(Photo: Shutterstock)

6. Malware

Short for malicious software, the term "malware" describes the spectrum of tools used nefariously by cybercriminals to hack computer networks including exploitation kits, computer viruses, network worms and remote access trojans.

According to Technopedia, some forms of malware "spy" on user Internet traffic. Examples include spyware and adware. Spyware monitors a user's location and if enabled, it can capture sensitive information, for example, credit card numbers, promoting identity theft. Adware also acquires user information, which is shared with advertisers and then integrated with unwanted, triggered pop-up ads.

Young-man-computer-hacker-multiple-computer-screens-crop-ThinkstockPhotos-493563100-Sitikka

(Photo: Thinkstock)

7. Network reconnaissance

Just as a common thief canvasses a neighborhood looking for vulnerable homes, a computer hacker often uses automated tools to scan large blocks of the Internet looking for systems and software to exploit.

After finding targets of opportunity, the hacker's next step is to identify the ones that may contain data or services that can be monetized.

Young-woman-holding-gun-with-computer-data-shutterstock_96228473-grafvision

(Photo: Shutterstock)

8. Ransomware

Modern ransomware attacks often use advanced encryption techniques to render a victim's data useless until the hacker's demands are met or a sum of money is paid.

Additional terms for ransomware include "crypto-virus," "crypto-Trojan" or "crypto-worm."

A well-known ransomware that surfaced on the Internet in 2013 is called CryptoLocker.

Person-using-laptop-computer-shutterstock239978956---ajayptp-crop-600x338

(Photo: Shutterstock)

9. Social engineering

Not all attacks are technically sophisticated. Social engineering involves classic deception to trick individuals into parting with their data and funds.

In some instances, employees are misled into making a payment to a fraudster posing as a client or vendor through email, fax or even over the phone. Generally, the person emailing or calling has just enough information to sound legitimate.

____________

How can you transform your risk management preparedness and response strategy into a competitive advantage?

Introducing ALM's cyberSecure — A two-day event designed to provide the insights and connections necessary to implement a preparedness and response strategy that changes the conversation from financial risk to competitive advantage. Learn more about how this inaugural event can help you reduce risk and add business value.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.

Rosalie Donlon

Rosalie Donlon is the editor in chief of ALM's insurance and tax publications, including NU Property & Casualty magazine and NU PropertyCasualty360.com. You can contact her at [email protected].