Glossary
See the definitions of key threats
Using the world wide web every day, each of us is exposed to numerous threats lurking in its resources. Due to the high activity and ingenuity of cybercriminals, new and increasingly sophisticated tools, mechanisms, and methodologies are being developed. Therefore, it’s safe to say that cybercriminals are chopping and changing their modus operandi, which is why, so as not to give anyone a headache from using the Internet (literally and figuratively :)) we give you a short overview of old and well-known threats, as well as the newer ones. Of course, it’s subjective and far from exhaustive, but it takes the form of an accessible (we hope) list and a glossary of key terms, which we have published as a separate article.
The classification should be prepared based on different criteria, which may lead to interesting conclusions as to what mechanisms govern a given modus operandi, as well as in which situations a given threat can be expected.
As mentioned in the introduction to this article, we have prepared them as a glossary available here.
Having read the above section, one cannot fail to find the diversity of the attack vectors to be striking. They occur in virtually every possible interaction between the user and the website used by them, as well as in the corporate environment. This is particularly important when allowing a BYOD (Bring Your Own Device) model in the workplace, in which case proper education focused on employee security awareness is crucial. After all, we need to remember about security both at home and at work.
Then it’s advisable to go into a deeper analysis of the risks described in this article and included in the mentioned glossary of relevant terms. This, with a particular focus on attacks based on social engineering, will be the subject of our deliberations in future publications on the CERT – Allegro website. Don’t hesitate to take a look here every now and then as we hope to share more interesting material with you over time!