null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
13545090
1.6 System Security
Description
GCSE Computing Mind Map on 1.6 System Security, created by kimi rod on 02/05/2018.
No tags specified
computing
gcse
Mind Map by
kimi rod
, updated more than 1 year ago
More
Less
Created by
kimi rod
over 6 years ago
107
0
0
Resource summary
1.6 System Security
Malware
trojan
decieves people to download it
deceptive
get informed w/ latest tricks
program that looks good but is bad
designed to gain unauthorised access to a computer system
software written to infect computers
on internet without protection = at risk
fraud and identity theft
Phishing
online fraud techinque
spamming people with fake messages
lures people into revealing personal info
credit cards, passwords etc.
fastest online crime method
identity theft
Brute Force
trial and error method
decrypting data (passwords etc)
Denial of Service
flooding a server with useless traffic
prevents them from responding to client server requests
service attack (DDOS)
multiple infected systems all target one system
Data Interception and Theft
packet sniffer program
the data goes where its not supposed to go
monitors traffic
stealing data
SQL Injection
technique to change data in a database
by inserting additional code into text input box
used to hack data driven applications
creates a different search engine
WAYS OF PREVENTION
penetration testing
network forensics
network policies
anti-malware software
firewalls
user access levels
passwords
encryption
THREATS IN NETWORK
people as 'weak point' (social engineering)
network policy
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computer Systems
lisawinkler10
GCSE Computing - 4 - Representation of data in computer systems
lilymate
GCSE Computing: Hardware
Yasmin F
OCR gcse computer science
Jodie Awthinre
A Christmas Carol Context
Olivia Bamber
Browse Library