Threats to computers and the data they hold

Descripción

GCSE Data Security Mapa Mental sobre Threats to computers and the data they hold, creado por alison.collins el 21/05/2013.
alison.collins
Mapa Mental por alison.collins, actualizado hace más de 1 año
alison.collins
Creado por alison.collins hace más de 11 años
496
1

Resumen del Recurso

Threats to computers and the data they hold
  1. Hackers
    1. Unless protected, anyone could potentially gain access to a computer system to edit, copy or delete computer files. Unauthorised users are sometimes called hackers.
    2. Malware
      1. Malware is the term for any computer program installed either deliberately or accidentally on a computer with the intention of causing harm. The most common types of malware are
        1. Viruses: these are programs designed to disrupt the workings of a computer. They are called viruses because they are designed to be spread from one infected machine to another. Viruses can be downloaded from websites or installed by opening a file attatched to a SPAM email.
          1. Spyware: this is software designed to monitor the ways the computer is used and then report this back to someone. One example is keystroke software - this could be used to record someone's password being typed into a bank website.
            1. Adware: this is software designed to monitor your internet use and then display adverts based on your web-browsing habits. Some software producers include adware in their programs as a way of getting back some of the costs of developing their products. Many people believe that adware is an invasion of privacy.
              1. Phising: this is when you recieve an email pretending to be from your bank or other business, requestiong that you visit their website and re-enter your password or other personal information. In reality, the website is a fake and the owner will use the data they collect from you to hack into your real bank account to withdraw money. Phishing emails are examples of SPAM.
            2. SPAM
              1. The email equivalent of junk mail
                1. The sender will often send the same message to thousands of random email addresses
                  1. They are hoping that just a few people will respond
                2. SPAM emails often contain fake offers to buy something
                  1. It is a very common way to send viruses
                  2. User precautions against unauthorised files
                    1. Users should be very careful when using the internet and email. In particular:
                      1. NEVER open an email attatchment unless you are certain what the file contains.
                        1. This especially includes emails recieved from people you do not know (SPAM messages)
                        2. Be very careful when visiting websites
                          1. Always be on the look out for potential problems
                          2. NEVER give out your personal data to sources unless you can definitely trust them
                            1. Just because a hyperlink in an email message says it will direct you to your bank, it doesn't mean that is where you are being taken
                            2. ALWAYS make sure that computer security software is kept up to date and switched on
                              1. Never leave your computer unattended whilst you are logged on
                                1. Anyone can then use it to gain access to your files and other parts of the system
                                  1. One solution is to 'lock' the screen so that it can only be unlocked by entering your password
                                2. When shopping on the internet, always make sure that the website you are using to enter your payment details is encrypted
                              Mostrar resumen completo Ocultar resumen completo

                              Similar

                              Anti-malware software
                              alison.collins
                              Guerra Fría
                              Eliu Elizondo
                              Brainstorming con Mapas Mentales
                              Diego Santos
                              Sistema nervioso
                              crisferroeldeluna
                              Historia de la Ética
                              hectorleyva
                              SUJETO Y PREDICADO
                              maya velasquez
                              Guía Rápida para Comenzar a Usar GoConqr
                              Diego Santos
                              3 Tipos de Interacciones para la Participación de los Alumnos
                              Diego Santos
                              PROCESOS Y MODALIDADES DE LA LECTURA
                              kilmejoo
                              Matemáticas - TERCERO Primaria - Multiplicación
                              asx elearning
                              UNIDAD 1-2-3. CONSTRUCTOS TEORICOS DEL APRENDIZAJE - PARADIGMAS DEL APRENDIZAJE-PSICOLOGIA Y APRENDIZAJE
                              veronica marin herrera