null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
8873708
System Threats
Description
6 Cyber threats
No tags specified
system
threat
computing
work
computing
year 10
Mind Map by
Jasmine Farmand
, updated more than 1 year ago
More
Less
Created by
Jasmine Farmand
over 7 years ago
9
0
0
Resource summary
System Threats
Malware
It's used for many different reasons which include:
Disrupting computer systems
Gaining sensitive info
Gaining access to private systems
Displaying unwanted adverts
Methods
Viruses
Worms
Scareware
Trojan horses
Spybots
Prevention
Installing anti-virus software
Always updating systems whenever possible
Think before clicking
Always backing up files
Malicious software is used to gain access to and damage computers without consent
Effects
Computer crashing or slowing down
Files may be deleted, stolen, corrupted, encrypted or changed
They may record your keystrokes to gain passwords, bank info, usernames etc
Phishing
How is it done?
Usually an email or message will be sent to the victim
It will either ask for money or link you to a fake website that looks real
The victim then enters their info on this website into the hands of the online criminals
What is gained?
Bank details
Usernames
Passwords
Preventions
Learn the signs that an email or website is fishy
Promote gifts, similar business logos, real name of employees, spelling mistakes in the email etc.
Safe websites begin with https:// and have a closed lock icon so only enter info on these sites
Strong protection
Disable pop-ups
What is it?
Phishing is the attempt to gain sensitive information from peoplethrough email/instant messenger
Brute force attack
What is it?
It's when an attacker tries many passwords in the hope of guessing correctly with one
How does it work?
It works by calculating every possible combination that could make up a passwords length
Prevention
Longer passwords can take decades to crack whereas short passwords can be discovered quickly
So create a long password with a mix of characters and numbers
Don't use dictionary words or slightly modified words as it is easy to guess
Locking accounts after failed guess attempts but this has its own problems
Captcha
What do they gain?
Theft of data
Access to private systems
Denial of service attack
What is it?
It's an attack launched on a network or website
DOS attacks are different, some can be relatively harmeless whilst others are infected with trojans
How?
Cyber criminals flood the target with useless requests or log in requests
This grinds the system to a halt
Malware can be used to control many computers to launch this attack ('zombies') which all send requests at the same time
Why and what is gained?
Extortion - Attackers can demand money to stop the attack (although success rate is low)
Sometimes people who DOS are hired to launch an attack on a rival company
To show their disapproval to a game, or the government, for example
To distract a network/company to perform other attacks
Results in a the compan/network losing reputation, time and money
Prevention
There isn't really a way to prevent an attack but making a plan if it happens,
constantly patching up vulnerabilities,
and having a strong firewall are ways to minimise damage
Packet filters on roters
SQL Injection
What is it?
SQL's a programming language and a hacker uses it to target a database or website form
How?
When the form asks for input, an SQL statement is entered which runs and allows the user...
...to control or change data in the database
Prevention
Lock down database servers and remove backdoors
Change default admin passwords
Prevention testing
Effects
Revealing data that's hidden
Data is controlled,stolen or changed
Data interception
What is it?
When a hacker intercepts data packets when they are being sent without the user knowing
How?
A hacker uses data packet analysers to intercept data packets when they are sent from a computer
Why, what do they gain?
Hackers gain things such as logins,passwords,credit cand numbers and PIN's
Prevention
Using data encrypting techniques so the hacker will get useless info
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
OCR gcse computer science
Jodie Awthinre
The Norman Conquest 1066-1087
adam.melling
Computing Hardware - CPU and Memory
ollietablet123
Physics Review!
Nicholas Weiss
Browse Library