Why are systems attacked

Beschreibung

Mindmap am Why are systems attacked, erstellt von Huey FREEMAN am 01/05/2020.
Huey FREEMAN
Mindmap von Huey FREEMAN, aktualisiert more than 1 year ago
Huey FREEMAN
Erstellt von Huey FREEMAN vor mehr als 4 Jahre
28
0

Zusammenfassung der Ressource

Why are systems attacked
  1. fun/challenge
    1. hacking systems can be fun or a challenge
      1. their is a sense of achievement
        1. friends may give respect for the hacking achievment
        2. distruption
          1. attacks such as Denial-Of-Service stop websites working
            1. viruses can slow down computers and delte files
            2. financial gains
              1. ransoms can be made to prevent attacks from happening
                1. ransomware can be used to encrypt a computer until you pay
                  1. a payment is given to carry out an attack on a organisatioon
                  2. Industrial espionage
                    1. the aim is to find intellectual property such as designs or blueprints for products , business stratagies or software source code
                    2. personal attack
                      1. employees that are unhappy might try and attack the company
                        1. friends/family may attack each other if upset over something
                      2. information/data theft
                        1. credit card and financial details are stolen to gain money
                          1. company information may also be stolen
                          2. Malware
                            1. Malicious Software
                              1. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                              2. Virus
                                1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                2. Worm
                                  1. Similar to virus but unlike a virus it is a self contained program. It is capable of spreading on it own, without help from humans. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                  2. Trojan Horse
                                    1. is a type of malware that is often disguised as legitimate software.
                                  Zusammenfassung anzeigen Zusammenfassung ausblenden

                                  ähnlicher Inhalt

                                  Fachbegriffe für den Sprachunterricht
                                  Stefan Kurtenbach
                                  Netzwerktechnik
                                  DFairy
                                  Vetie - Tierzucht & Genetik - S I
                                  Fioras Hu
                                  Vetie Radiologie VL-Fragen
                                  Carolina Heide
                                  Vetie - Probefragen+Klausur Tierhaltung
                                  E. König
                                  Gesko A: Theorien und Praxis des Journalismus
                                  Johanna Wojcik
                                  Vetie Radiologie 2019
                                  Anna Nie
                                  Vetie Parasitologie 2020
                                  Sophia Klemme
                                  Vetie: Berufrecht Altfragen 2013-2017 Teil 1
                                  Johanna Tr