cybersecurity

Welcome to the Cyber Security Information,Training & Reporting Platform

Report a cyberthreat

What is a cyber threat?

A cyber threat is a malicious act — or just the possibility of one — that seeks to damage or steal data, or to otherwise disrupt computer networks and systems. Common cyber threats include computer viruses, software vulnerabilities, distributed denial of service attacks (DDoS), and social engineering techniques, such as phishing. Even “offline” events like natural disasters can be considered a cyber threat, as they put systems and data at risk.

Cyber threats may come from a variety of sources, including:

  • Criminal gangs
  • Nation-states
  • Corporate spies
  • Disgruntled insiders
  • Individual hackers

No matter the source, cyber threats are a massive hazard. They threaten not only business health and operations, but even our daily life in this increasingly-digital world. And with AI and automation making cyberattacks easier to carry out, effective cyber protection is critical.

Cyber Threats

In the 1950s, the word “cyber” referred to cybernetics – the science of understanding the control and movement of machines and animals. This was followed by “cyber” standing for “computerized.”

The 1990s brought around a new cyber-related term. The word “cyberspace” emerged to define an invented physical space that some people wanted to believe existed behind the electronic activities of computing devices.

Test your knowledge of cybersecurity.

/5
1 votes, 5 avg
10
Created on

Test your Cyber Security knowledge

Cyber Security quiz helps us to increase our cyber knowledge.

1 / 5

Which of these is an example of a phishing attack?

2 / 5

Turning off the GPS of your device prevents any tracking of your location.

3 / 5

What kind of cybersecurity risks can be mitigated by using a VPN?

4 / 5

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

5 / 5

Which of the following should you do to restrict access to your devices and data?

Your score is

0%

Please rate this quiz

Get personal learning recommendations

Enhance your skills with best Online courses

Test your cybersecurity Knowledge

/5
0
Created on

Uncategorized

Cyber

1 / 5

Category: Uncategorized

Which of the following should you do to restrict access to your devices and data?

2 / 5

Category: Uncategorized

What kind of cybersecurity risks can be mitigated by using a VPN?

3 / 5

Category: Uncategorized

Turning off the GPS of your device prevents any tracking of your location.

4 / 5

Category: Uncategorized

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

5 / 5

Category: Uncategorized

Which of these is an example of a phishing attack?

Your score is

The average score is 0%

0%