Cyberattacks

Beschreibung

Year 11 Computer Science Mindmap am Cyberattacks, erstellt von Holly Dooley am 20/09/2018.
Holly Dooley
Mindmap von Holly Dooley, aktualisiert more than 1 year ago
Holly Dooley
Erstellt von Holly Dooley vor fast 6 Jahre
11
0

Zusammenfassung der Ressource

Cyberattacks

Anlagen:

  1. A cyberattack is an attempt by hackers to damage or destroy a computer network or system.
    1. Cyber attacks exploit us using a network or technical weakness to:
      1. Obtain data stored on the network
        1. Delete or modify data
          1. Make the system unusable
        2. Social engineering
          1. Phishing
            1. Emails claiming or appearing to be from a bank or building society e-commerce site, asking for details of passwords and credit cards.
            2. Shoulder surfing
              1. Finding passwords and PINs (Personal Identification Numbers) by watching people enter them.
              2. Targeting the users
                1. Social engineering involves tricking people into divulging secret information such as passwords and login information.
              3. Technical weaknesses
                1. Unpatched software
                  1. As software is used security flaws are discovered which can be exploited by hackers. The makers release patches to fix security issues but they have to be applied and often are forgotten about
                  2. USB devices
                    1. Employees could attach portable devices containing flash drives and copy sensitive information. They could also try to install software onto the network and introduce malware.
                    2. Smart devices
                      1. At home, such as kettles and fridges, are usually unprotected and can be targeted by hackers. They have been used to launch denial of service attacks.
                      2. Eavesdropping
                        1. The interception of digital communications. This is done by: directly listening to digital or analogue voice communication; the interception or 'sniffing' of data relating to any form of communication
                          1. Criminals use packet analysers or 'packet sniffers' to intercept the transmitted data packets, which are then analysed and their data decoded. The criminals can therefore steal sensitive data such as logins, passwords, credit card numbers and PINs. Encrypting data on a network is essential so that it cannot be of use if it is intercepted by eavesdropping.
                        Zusammenfassung anzeigen Zusammenfassung ausblenden

                        ähnlicher Inhalt

                        Computing Hardware - CPU and Memory
                        ollietablet123
                        SFDC App Builder 2
                        Parker Webb-Mitchell
                        Data Types
                        Jacob Sedore
                        Intake7 BIM L1
                        Stanley Chia
                        Software Processes
                        Nurul Aiman Abdu
                        Design Patterns
                        Erica Solum
                        CCNA Answers – CCNA Exam
                        Abdul Demir
                        Abstraction
                        Shannon Anderson-Rush
                        Spyware
                        Sam2
                        HTTPS explained with Carrier Pigeons
                        Shannon Anderson-Rush
                        Data Analytics
                        anelvr