Digital Transformation and Security Threats

Page 1

DIGITAL TRANSFORMATION AND SECURITY THREATS 1

3

2 •

• Software programs designed to damage or do other unwanted actions on a computer system.

MALWAR E

Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive information .

CYBER CRIMINALS

SAFETY

• Internet-connected devices, each of which is running one Itor can be used to more bots. perform distributed denial-ofservice attack , steal data, send spam, and allows the attacker to access the device and its connection.

4

5 • •

Computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

BOTNET

Computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it.

VIRUS

HACKERS

Aims to gather information about a person or organization, without their knowledge, and send such information to hack another entity without the consumer's consent.

Fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

PHISHING

SPYWARE

WORM

INFORMATION

LEAK

7

6

DATA

SECURITY

TRUST

TECHNOLOGIES, TOOLS AND METHODS ENABLING DIGITAL TRANSFORMATION

Mobile-Tech

ARTIFICIAL INTELLIGENCE

MACHINE LEARNING

ROBOTICS

AR/VR

INTERNET OF THINGS

BIG DATA

ADDITIVE MANUFACTURING

CLOUD

Web-Tech


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.