Unit 1.6 V2 System Security

Beschreibung

My Unit 1.6 GCSE Computing Mind map
Mathew Wheatley
Mindmap von Mathew Wheatley, aktualisiert more than 1 year ago
Mathew Wheatley
Erstellt von Mathew Wheatley vor mehr als 6 Jahre
74
2

Zusammenfassung der Ressource

Unit 1.6 V2 System Security
  1. Types of attack
    1. Malware - MALicious softWARE
      1. Files deleted, corrupted or encrypted
        1. Can cause identity theft
          1. Trojan Horses, Viruses and/or worms
          2. Phishing - Disguising as a normal webpage
            1. Peoples private accounts are accessed.
              1. Brands lose high value data and therefore reputation
              2. Brute Force Attack - Trial and Error Method
                1. Access to Corporate Systems
                  1. Theft of Personal Data; passwords and your PIN
                  2. DDOS - Direct Denial Of Service, zombie computers flood a system causing it to crash
                    1. Loss of access for customers
                      1. Loss of revenue and reputation of the company
                      2. Data Interception - Packet Sniffing to extract data throughout its 'journey'
                        1. Usernames and passwords can be compromised
                          1. Loss of corporate data is possible
                          2. SQL Injections - Can change data in a database by inserting extra code into a text input box
                            1. Private data in file can be released / altered
                              1. Rogue records can be added
                            2. Preventing Vulnerabilities
                              1. Penetration Testing - Checks for potential vulnerabilities by a qualified person in a controlled environment
                                1. Network Forensics - Thorough Forensic Investigation of networks and their devices
                                  1. Anti Malware - Prevents Malware
                                    1. Anti Virus - Specifically targets computer viruses
                                    2. Network Policies - Defines how a system can be secured through specific rules
                                      1. Firewall - Software that performs a 'barrier'. 99.9% effective. Detects patterns
                                        1. User Access Levels - Who can view what. Administrator makes a hierarchy
                                          1. Passwords - Allow a time gap and limit number of attempts
                                            1. Encryption - See Unit 1.5
                                              1. Biometric Security
                                              Zusammenfassung anzeigen Zusammenfassung ausblenden

                                              ähnlicher Inhalt

                                              Types and Components of Computer Systems
                                              Jess Peason
                                              Input Devices
                                              Jess Peason
                                              Output Devices
                                              Jess Peason
                                              Computing
                                              Kwame Oteng-Adusei
                                              Pack of playing cards answer
                                              Karl Taylor
                                              Code Challenge Flow Chart
                                              Charlotte Hilton
                                              2.1.3 Software
                                              Jake Youd
                                              Computing Hardware - CPU and Memory
                                              ollietablet123
                                              Computer Systems
                                              lisawinkler10
                                              Computer science quiz
                                              Ryan Barton
                                              Input, output and storage devices
                                              Mr A Esch