Cyber Security

Beschreibung

Mindmap am Cyber Security, erstellt von Madison GREENWOOD am 11/06/2020.
Madison GREENWOOD
Mindmap von Madison GREENWOOD, aktualisiert more than 1 year ago
Madison GREENWOOD
Erstellt von Madison GREENWOOD vor mehr als 4 Jahre
10
0

Zusammenfassung der Ressource

Cyber Security
  1. Key Terms
    1. Attack
      1. An attack is a deliberate action ,targeting an organisation's digital system or data
      2. Cyber security
        1. It refers to the range of measures that can be taken to protect computer systems
          1. Networks and data from unauthorised access or cyber attack
          2. Threat
            1. A threat is an incident or an action witch is deliberate or unintended that results in disruption down time or data lost
              1. Internal threat = caused by an incident inside an organisation
                1. External threat = caused outside the organisation
              2. Unauthorised access
                1. This refers to someone gaining entry without permission to an organisation's system,software of data
                  1. This achieved by exploiting a security vulnerability
                2. Trojan horse
                  1. Users are tricked into downloading it to their computer.Once installed the Trojan horse works under cover to carry out a out predetermined task
                  2. Rootkit
                    1. Designed to remotely access and control a computer system without being detected by security software or the user
                    2. ransomware
                      1. Encrypts files stored on a computer system without being detected by security software of the user
                      2. Spyware
                        1. Is secretly installed to collect information from someone else's computer
                        2. Key loggers
                          1. Spyware that records every Keystroke made on a computer to steal personal infomation
                          2. Adware
                            1. Automatically shows adverts such as pop ups
                              1. most adware is harmless but some contain spyware such as keyloggers
                            2. Botnet
                              1. Bots take control of a computer system,without the users knowledge.A botnet is a large collection of malware-infected devices(zombies)
                                1. An attacker(bot herder) chooses when to 'wake' the zombies to preform an attack
                              2. Distributed Denial -of-service attack (DDoS attack)
                                1. Flooding a website with useless traffic to inundate and overwhelm the network
                              3. Social engineering
                                1. It is a set of methods used by cyber criminals to deceive individuals into handling over information that they can use for fraudulent purposes
                                  1. Shoulder surfing/shouldering
                                    1. It involves the attacker watching the victim while they provide sensitive information
                                    2. Phishing
                                      1. Is an attack in witch the victim receives an email disguised to look as if it has come from a reputable data.The email usually provides a link to another website where the information can be imputted
                                      2. Pharming
                                        1. It is when a victim redirects the user from a genuine website to a fake website
                                          1. Some pharming sites are so expertly copied from the genuine website that is very difficult to identity therefore this is carried out without the user knowing about it
                                      Zusammenfassung anzeigen Zusammenfassung ausblenden

                                      ähnlicher Inhalt

                                      CyberSecurity
                                      Stephen Williamson
                                      CSS exam
                                      Andy Oung
                                      cyber security
                                      Samuel Melendez
                                      Certified Information Systems Security Professional (CISSP)
                                      GoAsk Chaz
                                      Artificial Intellegence
                                      nicky elin
                                      Pears of Wisdom - Security Concepts
                                      Alex Poiry
                                      CSS exam_1
                                      Andy Oung
                                      Phishing Mindmap Salvy
                                      Salvy Ganpatsingh
                                      cyber security
                                      Jacqui Breeds
                                      Streitstände - Strafecht
                                      myJurazone
                                      Machst du auch diese 10 typischen Fehler auf Deutsch?
                                      Dilyana Hunley