System Security-updated

Beschreibung

Mind map on system security GCSE computer science OCR
sj w
Mindmap von sj w, aktualisiert more than 1 year ago
sj w
Erstellt von sj w vor mehr als 4 Jahre
5
0

Zusammenfassung der Ressource

System Security-updated
  1. Types of attack
    1. Malware
      1. Spyware
        1. Secretly moniters the uses actions eg. key presses
        2. Trojans
          1. Malware disguised as ligit software
          2. Keyloggers
            1. Were the keys are moniterd so they can get info like passwords etc
            2. Virus'
              1. They attach by coping themselves to files
                1. They are then spread and opening infected files activate them
                2. Ransom ware
                  1. these encrypt all the files and the user is then told to pay alot of money to get the key
                    1. Without paying the files are all lost so many do
                    2. Malware is a software that can harm devices
                      1. They can do this by: deleting/modifying files, scareware, virus', worms etc.
                      2. Denial of Servise
                        1. DoS- were the hackers do not want people to access a spceific webpage
                          1. They flood the network with so much traffic the network is very slow and then crashes
                            1. This can happen when a network get so much ligit traffic it crashes, eg when tickets are on sale
                            2. Brute Force
                              1. An attack that uses software to crack passwords etc
                                1. they do this by trying everything that it could be one by one
                                2. Social Engineering
                                  1. This is a way or illegally accessing data by influwencings people and using them
                                    1. People often are the weak link in computer security
                                    2. Phishing
                                      1. This is were people send emails to accounts claiming to be a ligit business, sometimes there's a virus in the email other times you spend money there but its not the real site or give private details
                                      2. Pharming
                                        1. A website set up to look like a ligit business' one to get private details. Internet users are directed to this bogus site unknowingly thinking its the real one
                                      3. How to prevent an attack
                                        1. Network Policy's
                                          1. This is a set of rules and procedures set out by company's to protect there networks, has things such as, rules about which passwords are ok, To prevent vanrabilitys
                                          2. Passwords
                                            1. Making shore that the passwords are strong
                                              1. Each person with access keeps there passwords safe, dosnt' tell anyone
                                                1. A strong password has a mix of letters, symbles, and numbers
                                                2. Firewalls and anti malware
                                                  1. These act as bounsers checking every thing that go's out and in the network
                                                    1. They identify and stop any malisus suff come on to the network
                                                    2. Encryption
                                                      1. This is were the data is translated into a code, this means that even if it is intersepted by a hacker, then they can not understand what the data is.
                                                        1. only someone (or computer) who the data is intended for, knows what the key is and therefore they are the only ones that can decrypt the data
                                                        2. Penetration testing
                                                          1. This is were companies hire people to simulate attacks to find flours before a black hat hacker
                                                        Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                        ähnlicher Inhalt

                                                        GCSE Biology B2 (OCR)
                                                        Usman Rauf
                                                        C1 Quiz
                                                        Leah Firmstone
                                                        B7 Quiz - The Skeleton, Movement and Exercise
                                                        Leah Firmstone
                                                        OCR Physics P2 revision cards
                                                        Alex Howard
                                                        P2 Quiz
                                                        Leah Firmstone
                                                        GCSE Physics P7 (OCR) - Light, Telescopes, and Images
                                                        Josh Price
                                                        Voices and vocal techniques
                                                        Rosa Brookes
                                                        GCSE Physics P7 (OCR) - Astronomy
                                                        Josh Price
                                                        GCSE Physics P7 (OCR) - Sun, and Stars
                                                        Josh Price
                                                        B7.1-3 - Peak Performance
                                                        franimal
                                                        GCSE Physics P7 (OCR) - Mapping the Universe
                                                        Josh Price