learning aim b: cyber security

Beschreibung

Mindmap am learning aim b: cyber security, erstellt von Keane MEEK am 01/05/2020.
Keane MEEK
Mindmap von Keane MEEK, aktualisiert more than 1 year ago
Keane MEEK
Erstellt von Keane MEEK vor mehr als 4 Jahre
7
0

Zusammenfassung der Ressource

learning aim b: cyber security
  1. key terms
    1. threat
    2. why systems are attacked
      1. malware
        1. trojan horse

          Anmerkungen:

          • users are tricked into downloading it. 
          1. rootkit

            Anmerkungen:

            • is a set of tools that give a hacker high level administrative control of a computer.
            1. ransomware

              Anmerkungen:

              • encrypted files stored on a computer to exort or steal money from organisations.
              1. spyware

                Anmerkungen:

                • malicious software secretly installed to collect information from someone elses computer.
                1. keyloggers

                  Anmerkungen:

                  • spyware that records every keystroke made on a computer to steal personal information.
          2. botnet

            Anmerkungen:

            • is an army of zombie devices used to carry out mass attacks and send spam to millions of users.
            1. DDOS

              Anmerkungen:

              • flooding a website with useless traffic to inundate and overwhelm the network.
          3. social engineering

            Anmerkungen:

            • involves tricking people into divulging valuable information about themselves.
            1. phishing

              Anmerkungen:

              • a way of attempting to acquire information by pretending to be from a trustworthy source.
              1. spear phishing

                Anmerkungen:

                • involves bespoke emails being sent to well searched victims.
                1. blagging

                  Anmerkungen:

                  • a blagger invents a scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
                  1. shoulder surfing

                    Anmerkungen:

                    • acquiring sensitive information by someone peering over a users shoulder when they are using a device.
                    1. pharming

                      Anmerkungen:

                      • involves redirecting people to bogus look a like websites without realising it has happened. 
                      1. man in the middle attack

                        Anmerkungen:

                        • a form of eavesdropping where the attacker makes a independent connection between two victims and steals information to use fraudulently. 
            Zusammenfassung anzeigen Zusammenfassung ausblenden

            ähnlicher Inhalt

            Urlaub und Reisen
            JohannesK
            Sehenswürdigkeiten Deutschlands
            Natalia Romanova
            Sozialpsychologie
            jtefert
            IELTS-Vokabeln
            anna.grillborzer0656
            IKA-Theoriefragen Serie 19 (15 Fragen)
            IKA ON ICT GmbH
            PuKW STEP 6 (mögliche Prüfungsfragen/Prüfungsvorbereitung)
            frau planlos
            Shakespeare and the Elizabethan World
            Laura Overhoff
            Kapitel 1: Was macht Psychologie einzigartig?
            bence-bartos
            Abiturthemen 2016 in Deutsch für alle Bundesländer
            Laura Overhoff
            U1 Buchproduktion
            Lena A.
            Repro 2017 Vetie
            Kim Langner