cyber sicurity

Beschreibung

Mindmap am cyber sicurity, erstellt von Maddox GARDNER am 12/06/2020.
Maddox GARDNER
Mindmap von Maddox GARDNER, aktualisiert more than 1 year ago
Maddox GARDNER
Erstellt von Maddox GARDNER vor mehr als 4 Jahre
7
0

Zusammenfassung der Ressource

cyber sicurity
  1. key terms
    1. threat
      1. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss. Internal Threat = caused by an incident inside an organisation External Threat = caused outside the organisation
      2. attack
        1. An attack is a deliberate action, targeting an organisation’s digital system or data.
        2. unortharised accsess
          1. This refers to someone gaining entry without permission to an organisation’s system, software or data. This achieved by exploiting a security vulnerability
        3. refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
          1. hackers
            1. s someone who seeks out and exploits these vulnerabilities.
              1. black hat hacker
                1. is someone who tries to inflict damage by compromising security systems
                2. is someone who does it for fun and not with malicious intent
                  1. white hat hacker
                    1. is someone who works with organizations to strengthen the security of a system
                    2. gray hat hacker
                      1. malware
                        1. trojon horse
                          1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                          2. rootkik
                            1. Designed to remotely access and control a computer system without being detected by security software or the user.
                            2. ransomware
                              1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                              2. spyware
                                1. s secretly installed to collect information from someone else's computer
                                2. keyloggers
                                  1. pyware that records every keystroke made on a computer to steal personal information
                                  2. adware
                                    1. Automatically shows adverts such as popups. Most adware is harmless but some contain spyware such as keyloggers
                                3. malaweare
                                  1. virua
                                    1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                    2. worm
                                      1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                    Zusammenfassung anzeigen Zusammenfassung ausblenden

                                    ähnlicher Inhalt

                                    Die Verwandlung von Franz Kafka
                                    AntonS
                                    Collocation - Business English - EBC - WU
                                    Geht euch nichts an
                                    PuKW STEP 4 (mögliche Prüfungsfragen/Prüfungsvorbereitung)
                                    Sandra S.
                                    Vetie - Tierzucht & Genetik - T II
                                    Fioras Hu
                                    Gesundheitspsychologie EC Uni Wien
                                    hans urst
                                    PuKW STEP6 - Hummel (Sofort überprüfbar)
                                    Tim Schröder
                                    Kommunikationssoziologie (KSOZ) Grimm 2017/18
                                    Benedikt Zöchling
                                    Vetie Immunologie 168-196
                                    verena be
                                    Vetie Mikrobiologie 2013
                                    Maria Jacob
                                    Parasitologie Quiz
                                    Peter Christian Ponn