Computer security: Difference between revisions

Content deleted Content added
mNo edit summary
Tags: Reverted Visual edit
Reverted 1 edit by Evacapperson (talk): Does not seem to correspond to anything written in the article
Line 22:
 
Normal internet users are most likely to be affected by untargeted cyberattacks.<ref name="Cyber attacks">{{Cite web |title=How cyber attacks work |url=https://www.ncsc.gov.uk/information/how-cyber-attacks-work |access-date=2023-11-30 |website=www.ncsc.gov.uk |language=en}}</ref> These are where attackers indiscriminately target as many devices, services, or users as possible. They do this using techniques that take advantage of the openness of the Internet. These strategies mostly include [[phishing]], [[ransomware]], [[Watering hole attack|water holing]] and scanning.<ref name="Cyber attacks" />
 
[[File:Framework-01.png|alt=Uploaded a work by National Institute of Standards and Technology (NIST) from https://www.nist.gov/news-events/news/2018/04/nist-releases-version-11-its-popular-cybersecurity-framework with UploadWizard|thumb|NIST Framework]]
To secure a computer system, it is important to understand the attacks that can be made against it, and these [[threat (computer)|threats]] can typically be classified into one of the following categories: