DIGITAL TRANSFORMATION AND SECURITY THREATS 1
3
2 •
• Software programs designed to damage or do other unwanted actions on a computer system.
MALWAR E
Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive information .
CYBER CRIMINALS
SAFETY
• Internet-connected devices, each of which is running one Itor can be used to more bots. perform distributed denial-ofservice attack , steal data, send spam, and allows the attacker to access the device and its connection.
4
5 • •
Computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
BOTNET
Computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it.
VIRUS
HACKERS
•
Aims to gather information about a person or organization, without their knowledge, and send such information to hack another entity without the consumer's consent.
•
Fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
PHISHING
SPYWARE
WORM
INFORMATION
LEAK
7
6
DATA
SECURITY
TRUST
TECHNOLOGIES, TOOLS AND METHODS ENABLING DIGITAL TRANSFORMATION
Mobile-Tech
ARTIFICIAL INTELLIGENCE
MACHINE LEARNING
ROBOTICS
AR/VR
INTERNET OF THINGS
BIG DATA
ADDITIVE MANUFACTURING
CLOUD
Web-Tech