cyber security

Description

Mind Map on cyber security, created by ryan brannigan on 11/06/2020.
ryan  brannigan
Mind Map by ryan brannigan , updated more than 1 year ago
ryan  brannigan
Created by ryan brannigan over 4 years ago
13
0

Resource summary

cyber security
  1. key terms
    1. un atorised entery
      1. un wanted access to your computer
      2. attack
        1. internet
          1. external
            1. caused out side of the orginisation
            2. incident
            3. cyber security
            4. hackers
              1. some one that gets into a compuer
                1. a person or thing that hacks technoligy
                2. types of threates
                    1. malware
                      1. pecifically designed to disrupt, damage, or gain unauthorized access to a computer system.
                        1. Trojan Horse:
                          1. Rootkit
                            1. Ransomware:
                              1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                              2. spyware
                                1. Is secretly installed to collect information from someone else's computer
                                2. keyloggers
                                  1. spyware that records every keystroke made on a computer to steal personal information
                              3. social enjenering
                                1. Shoulder Surfing/Shouldering
                                  1. It involves the attacker watching the victim while they provide sensitive information
                                  2. Phishing
                                    1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                                    2. Pharming
                                      1. s when a victim redirects the user from a genuine website to a fake one.
                                      2. Blagging/Pretexting
                                        1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                        2. Tailgating/Piggybacking
                                          1. Trying to gain access to a secure room or building.
                                          2. Baiting
                                            1. Cyber criminals make a promise of goods to get the information that they need.
                                          Show full summary Hide full summary

                                          Similar

                                          CyberSecurity
                                          Stephen Williamson
                                          CSS exam
                                          Andy Oung
                                          cyber security
                                          Samuel Melendez
                                          Certified Information Systems Security Professional (CISSP)
                                          GoAsk Chaz
                                          Artificial Intellegence
                                          nicky elin
                                          Pears of Wisdom - Security Concepts
                                          Alex Poiry
                                          CSS exam_1
                                          Andy Oung
                                          Phishing Mindmap Salvy
                                          Salvy Ganpatsingh
                                          cyber security
                                          Jacqui Breeds
                                          Trigonometry, Equations, Pythagoras theorem
                                          Caitlin Mortlock
                                          Study tips/hacks
                                          Sarah Biswas