null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
13333674
Unit 1.6 V2 System Security
Descripción
My Unit 1.6 GCSE Computing Mind map
Sin etiquetas
gcsecomputing
unit1.6
computing
year 10
Mapa Mental por
Mathew Wheatley
, actualizado hace más de 1 año
Más
Menos
Creado por
Mathew Wheatley
hace más de 6 años
74
2
0
Resumen del Recurso
Unit 1.6 V2 System Security
Types of attack
Malware - MALicious softWARE
Files deleted, corrupted or encrypted
Can cause identity theft
Trojan Horses, Viruses and/or worms
Phishing - Disguising as a normal webpage
Peoples private accounts are accessed.
Brands lose high value data and therefore reputation
Brute Force Attack - Trial and Error Method
Access to Corporate Systems
Theft of Personal Data; passwords and your PIN
DDOS - Direct Denial Of Service, zombie computers flood a system causing it to crash
Loss of access for customers
Loss of revenue and reputation of the company
Data Interception - Packet Sniffing to extract data throughout its 'journey'
Usernames and passwords can be compromised
Loss of corporate data is possible
SQL Injections - Can change data in a database by inserting extra code into a text input box
Private data in file can be released / altered
Rogue records can be added
Preventing Vulnerabilities
Penetration Testing - Checks for potential vulnerabilities by a qualified person in a controlled environment
Network Forensics - Thorough Forensic Investigation of networks and their devices
Anti Malware - Prevents Malware
Anti Virus - Specifically targets computer viruses
Network Policies - Defines how a system can be secured through specific rules
Firewall - Software that performs a 'barrier'. 99.9% effective. Detects patterns
User Access Levels - Who can view what. Administrator makes a hierarchy
Passwords - Allow a time gap and limit number of attempts
Encryption - See Unit 1.5
Biometric Security
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
2.1.3 Software
Jake Youd
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch
Explorar la Librería