null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12933079
1.6 system security
Description
1.1 - 1.8 Mind Map on 1.6 system security, created by liam oneill on 21/03/2018.
No tags specified
1.1 - 1.8
Mind Map by
liam oneill
, updated more than 1 year ago
More
Less
Created by
liam oneill
almost 7 years ago
53
0
0
Resource summary
1.6 system security
forms of attack
Malware
includes viruses, worms and trojan horses
worms
replicate itself in order to spread across a network
in order to do this it exploits vulnerabilities in a network
torjan horse
designed to access a computer by misleading the user of its intent
malicious software is designed to cause damage to a network or computer system
it attaches itself to files and programs on a computer system
phishing
designed to acquire sensitive information
commonly sent through email
telephone phishing
direct phone calls that pretend to be an official service
brute force
trial and error
can be used for gaining access to password-based entry systems
consists of an attacker entering possible passwords and phrases until one is correct
data interception and theft
packets that travel over networks can be intercepted
if packets are encrypted a key will be needed
packets reassembled by using a signature
SQL detection
social engineering
relies on human interaction
involves tricking users into breaking normal security procedures
DDOS
overloading a website with unwanted traffic
uses a number of computers over a network of infected machines which send requests to a website which would bring it offline
preventing attacks
penetration testing
tests conducted in a controlled envirmoent
network forensics
involves the examination of data sent across a network
packet sniffing
helps a user understand what is being sent across the network all the time
packet sniffing without written permission is a breach of the law
network policies
outline rules for network access
acceptable use policy (AUP)
anti malware software
aims to prevent malware from entering the system
firewalls
software that performs as a barrier
not 100% effective
can be held on a server or a stand alone computer
passwords
encryption
data is translated into code
julius ceasr
the key tells how many places along the alphabet the real letter is
user access levels
allows a system administrator to set up a hierarchy of users
lower level users = limited access
threats posed to networks
poor network policy
can expose a network to many threats
most networks restrict users to what they can and cant do
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
OCR AS Biology - Lipids
Chris Osmundse
To Kill A Mockingbird GCSE English
naomisargent
Geography Coasts Questions
becky_e
Vectors
Andrea Leyden
Macbeth Notes
Bella Ffion Martin
AQA - English Language Unit 1
Alice Love
GCSE REVISION TIMETABLE
haameem1999
GCSE REVISION TIMETABLE
Sonia Christopher
New GCSE Maths required formulae
Sarah Egan
2PR101 1.test - 8. část
Nikola Truong
Which GoConqr Product is Right for Me?
Sarah Egan
Browse Library