cyber security

Beschreibung

Mindmap am cyber security, erstellt von Will HAINES am 11/06/2020.
Will HAINES
Mindmap von Will HAINES, aktualisiert more than 1 year ago
Will HAINES
Erstellt von Will HAINES vor mehr als 4 Jahre
7
0

Zusammenfassung der Ressource

cyber security
  1. key terms
    1. threat
      1. internal threat
        1. caused by an incident inside an organisation
        2. external threat
          1. caused outside the organisation
          2. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
          3. attack
            1. An attack is a deliberate action, targeting an organisation’s digital system or data.
            2. unauthorised access
              1. This refers to someone gaining entry without permission to an organisation’s system, software or data. This achieved by exploiting a security vulnerability
            3. hackers
              1. is someone who seeks out and exploits these vulnerabilities.
                1. black hat hackers
                  1. is someone who tries to inflict damage by compromising security systems
                  2. GREY HAT HACKER
                    1. is someone who does it for fun and not with malicious intent
                    2. WHITE HAT HACKER
                      1. is someone who works with organizations to strengthen the security of a system
                    3. malware
                      1. Trojan Horse
                        1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                        2. Rootkit
                          1. Designed to remotely access and control a computer system without being detected by security software or the user.
                          2. Ransomware
                            1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                            2. Spyware
                              1. Is secretly installed to collect information from someone else's computer
                              2. Keyloggers
                                1. spyware that records every keystroke made on a computer to steal personal information
                                2. Adware
                                  1. Automatically shows adverts such as popups.
                                3. social engineering
                                  1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes
                                    1. Shoulder Surfing/Shouldering
                                      1. It involves the attacker watching the victim while they provide sensitive information
                                      2. Phishing
                                        1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
                                        2. Pharming
                                          1. is when a victim redirects the user from a genuine website to a fake one.
                                          2. Blagging
                                            1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                            2. Tailgating
                                              1. Trying to gain access to a secure room or building.
                                              2. Baiting
                                                1. Cyber criminals make a promise of goods to get the information that they need.
                                                2. Quid Pro Quo
                                                  1. Cyber criminals make a promise of a service to get the information that they need.
                                                Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                ähnlicher Inhalt

                                                CyberSecurity
                                                Stephen Williamson
                                                CSS exam
                                                Andy Oung
                                                cyber security
                                                Samuel Melendez
                                                Certified Information Systems Security Professional (CISSP)
                                                GoAsk Chaz
                                                Artificial Intellegence
                                                nicky elin
                                                Pears of Wisdom - Security Concepts
                                                Alex Poiry
                                                CSS exam_1
                                                Andy Oung
                                                Phishing Mindmap Salvy
                                                Salvy Ganpatsingh
                                                cyber security
                                                Jacqui Breeds
                                                Vetie - Innere Medizin 2013
                                                Fioras Hu
                                                Vetie - Spezielle Pathologie 2021
                                                Svea Schill