– In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks.
– Decoy system or network to attract potential attackers that helps limit access to actual systems by detecting and deflecting or learning from an attack. Multiple honeypots form a honeynet.
A breach of the security rules for a system or service, such as:
> attempts to gain unauthorised access to a system and/or data
> unauthorised use of systems for the processing or storing of data
> changes to a systems firmware, software or hardware without the system owners consent
> malicious disruption and/or denial of service
– The potential for damage to be done maliciously or inadvertently by a legitimate user with privilleged access to systems, networks or data.
Internet of things (IoT)
– Refers to the ability of everyday objects (rather than computers and devices) to connect to the Internet. Examples include kettles, fridges and televisions.
– A small program that can automate tasks in applications (such as Microsoft Office) which attackers can use to gain access to (or harm) a system.
– Using online advertising as a delivery method for malware.
– Malicious software – a term that includes viruses, trojans, worms or any code or content that could have an adverse impact on organisations or individuals.
– Steps that organisations and individuals can take to minimise and address risks.
Source: National Cyber Security Centre (a part of GCHQ)