ICT

Welcome to the Zimbabwe Cyber Security Information,Training & Reporting Platform

Report a cyberthreat

cyber@ictministry.gov.zw

What is a cyber threat?

A cyber threat is a malicious act — or just the possibility of one — that seeks to damage or steal data, or to otherwise disrupt computer networks and systems. Common cyber threats include computer viruses, software vulnerabilities, distributed denial of service attacks (DDoS), and social engineering techniques, such as phishing. Even “offline” events like natural disasters can be considered a cyber threat, as they put systems and data at risk.

Cyber threats may come from a variety of sources, including:

  • Criminal gangs
  • Nation-states
  • Corporate spies
  • Disgruntled insiders
  • Individual hackers

No matter the source, cyber threats are a massive hazard. They threaten not only business health and operations, but even our daily life in this increasingly-digital world. And with AI and automation making cyberattacks easier to carry out, effective cyber protection is critical.

Cyber Threats

In the 1950s, the word “cyber” referred to cybernetics – the science of understanding the control and movement of machines and animals. This was followed by “cyber” standing for “computerized.” The 1990s brought around a new cyber-related term. The word “cyberspace” emerged to define an invented physical space that some people wanted to believe existed behind the electronic activities of computing devices.

Test your knowledge of cybersecurity.

/5
0 votes, 0 avg
2
Created on

Test your Cyber Security knowledge

Cyber Security quiz helps us to increase our cyber knowledge.

1 / 5

Turning off the GPS of your device prevents any tracking of your location.

2 / 5

Which of these is an example of a phishing attack?

3 / 5

Which of the following should you do to restrict access to your devices and data?

4 / 5

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

5 / 5

What kind of cybersecurity risks can be mitigated by using a VPN?

Your score is

0%

Please rate this quiz

Get personal learning recommendations

Enhance your skills with best Online courses