1.6 System Security

Beschreibung

Mindmap am 1.6 System Security, erstellt von Casey Morris am 21/03/2018.
Casey Morris
Mindmap von Casey Morris, aktualisiert more than 1 year ago
Casey Morris
Erstellt von Casey Morris vor mehr als 6 Jahre
72
0

Zusammenfassung der Ressource

1.6 System Security
  1. Forms of Attack
    1. Malware
      1. Brute Force
        1. Trial and error is a brute force attempt to access a computer system.
        2. Phising
          1. Denial Of Service
            1. It is a type of attack when multiple compromised systems which are often infected with trojan and uses it to target a single system.
            2. SQL injection
              1. Data interception and theft
                1. Data interception and theft is a hacker has stole data from a computer. They can do this by tapping a connection, intercepting wireless traffic, or plugging into a network and monitoring traffic.
              2. Phising is usually disguised as a used popular website or spammed messages so you provide your email address and other personal details. It pretends to be trustworthy.
                1. Encryption
                  1. where data is translated into code so that only authorised users, or users with the key can decrypt it.
                2. What is system security and cyber attacks?
                  1. A cyber attack is an attempt to gain unauthorised access to or control of a computer and the network which it is connected to
                    1. Security is a set of measures taken to protect a computer from harm to the data and software.
                    2. Reasons for Network security
                      1. Confidental data
                        1. Data Theft
                          1. Data Loss
                            1. Data Changes
                              1. Legal obligations
                              2. Worms are a network threat as they are hard to get rid of as they copy themselves over networks to external storage and other computers
                                1. Spyware collects your information and sends it to somebody.
                                  1. A keylogger can be either hardware or software. It is designed to record every key that is pressed on a keyboard, therefore giving access to all the data that is entered into a computer such as usernames, passwords or websites visited.
                                    1. A trojan is a program which is designed to deliberately trick a user in to downloading and installing malicious software.
                                      1. Identifying and preventing vulnerabilities
                                        1. Passwords
                                          1. Encryption
                                            1. Firewalls
                                              1. Network policies
                                                1. Network forensics
                                                  1. Penetration testing
                                                    1. User access levels
                                                    2. Social Engineering
                                                      1. Relies on human interaction
                                                        1. Commonly involves tricking users into breaking normal security procedures
                                                        2. Malware
                                                          1. It is malicious software that causes identify theft, financial loss and permanent file deletion.
                                                          2. Virus
                                                            1. A virus harms your computer in some way. It usually deletes or begins altering files and stops programs from running.
                                                              1. Around 82,00 viruses are made each day
                                                                1. Can affect all components of an operating system
                                                              2. DDOS
                                                                1. Overloads a website with unwanted traffic
                                                                2. The effects of a successful attack
                                                                  1. Execute queries, exposing data
                                                                    1. Delete data
                                                                      1. Altering data, resulting in data integrity issues
                                                                        1. Bypass authentication procedures and impersonate specific user
                                                                        2. Anti malware software
                                                                          1. Software with the aim of preventing malware from entering the system.
                                                                          2. Firewalls
                                                                            1. Software that performs a 'barrier' between a potential attack and the computer system
                                                                              1. Monitor application and network usage
                                                                                1. Can be held on a server, or a standalone computer
                                                                                2. Network Policies
                                                                                  1. Defines how a system can be secured through specific rules or requirements.
                                                                                    1. Explains how particular a user should access and treat a system
                                                                                    2. User Access Levels
                                                                                      1. also known as system access rights
                                                                                        1. allows a system administrator to set up a hierarchy of users.
                                                                                          1. Lower level users would have access to limited information and settings.
                                                                                            1. Higher level users can access the most sensitive data on the system
                                                                                            2. Biometric security
                                                                                              1. Can be used in addition to 'standard' password entry
                                                                                                1. Examples - retina scan, fingerprint, voice and facial recognition.
                                                                                                2. SQL injection
                                                                                                  1. attacks could access systems containing customer data, intellectual property and other sensitive information
                                                                                                    1. Malicious code to be user in an SQL query when it is run in order for the injection attack to take place.
                                                                                                    2. Network Forensics
                                                                                                      1. A branch of digital forensics
                                                                                                        1. Covers the forensic investigation of networks and their devices attached to them
                                                                                                          1. primarily involves the examination of data sent across a network
                                                                                                            1. May involve the user of various forensic techniques including 'packet sniffing'
                                                                                                              1. Packet sniffing involves the interception of packets across the network
                                                                                                                1. Packet sniffing tools can help users understand what is being sent around the network at the time.
                                                                                                            2. Penetration Testing
                                                                                                              1. Tests performed under a controlled environment by a qualified person
                                                                                                                1. Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they cannot be maliciously exploited.
                                                                                                                Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                                                                ähnlicher Inhalt

                                                                                                                must, had to, mustn't oder don't need to
                                                                                                                escobar.annelize
                                                                                                                Quiz Strategie und Entrepreneurship
                                                                                                                benny.biering
                                                                                                                E - Funktion
                                                                                                                Kaja-Lotta
                                                                                                                Spanisch Einstufungstest Niveau B1.2
                                                                                                                SprachschuleAktiv
                                                                                                                Modul 2D FernUni Hagen Bourdieu
                                                                                                                Anni T-Pünktchen
                                                                                                                Induktionsstrom und Transformatoren
                                                                                                                Peter Kasebacher
                                                                                                                Oxford Academic Word List Sub1
                                                                                                                torsten fab
                                                                                                                Vetie: Virofragen 2015
                                                                                                                Johanna Tr
                                                                                                                Vetie - Probefragen+Klausur Tierhaltung
                                                                                                                E. König
                                                                                                                Vetie Histopatho 2009
                                                                                                                Carolina Heide
                                                                                                                Vetie Gerichtliche Veterinärmedizin
                                                                                                                Fioras Hu