An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file-based malware attacks,detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.
Malware means malicious software. One of the most common cyber threats is malware. Malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. It is often spread via an unsolicited email attachment or legitimate-looking download.
Virus: A self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computer where they cause damage or collect data.
Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details.
Ransomware: Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.
Adware: Advertising software which can be used to spread malware.
Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission.
SQL injection An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. This gives them access to the sensitive information contained in the database.
Phishing Phishing is when a cybercriminal targets a victim with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information.
Man-in-the-middle attack A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two individuals in order to steal data. For example, on an unsecured WiFi network, an attacker could intercept data being passed from the victim’s device and the network.
Denial-of-service attack Denial-of-service attack is where cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions.