learning aim b: cyber security

Descripción

Mapa Mental sobre learning aim b: cyber security, creado por Keane MEEK el 01/05/2020.
Keane MEEK
Mapa Mental por Keane MEEK, actualizado hace más de 1 año
Keane MEEK
Creado por Keane MEEK hace casi 5 años
7
0

Resumen del Recurso

learning aim b: cyber security
  1. key terms
    1. threat
    2. why systems are attacked
      1. malware
        1. trojan horse

          Nota:

          • users are tricked into downloading it. 
          1. rootkit

            Nota:

            • is a set of tools that give a hacker high level administrative control of a computer.
            1. ransomware

              Nota:

              • encrypted files stored on a computer to exort or steal money from organisations.
              1. spyware

                Nota:

                • malicious software secretly installed to collect information from someone elses computer.
                1. keyloggers

                  Nota:

                  • spyware that records every keystroke made on a computer to steal personal information.
          2. botnet

            Nota:

            • is an army of zombie devices used to carry out mass attacks and send spam to millions of users.
            1. DDOS

              Nota:

              • flooding a website with useless traffic to inundate and overwhelm the network.
          3. social engineering

            Nota:

            • involves tricking people into divulging valuable information about themselves.
            1. phishing

              Nota:

              • a way of attempting to acquire information by pretending to be from a trustworthy source.
              1. spear phishing

                Nota:

                • involves bespoke emails being sent to well searched victims.
                1. blagging

                  Nota:

                  • a blagger invents a scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
                  1. shoulder surfing

                    Nota:

                    • acquiring sensitive information by someone peering over a users shoulder when they are using a device.
                    1. pharming

                      Nota:

                      • involves redirecting people to bogus look a like websites without realising it has happened. 
                      1. man in the middle attack

                        Nota:

                        • a form of eavesdropping where the attacker makes a independent connection between two victims and steals information to use fraudulently. 
            Mostrar resumen completo Ocultar resumen completo

            Similar

            Historia Argentina
            Nicolas Ñancucheo
            Listenings para el FCE
            Diego Santos
            Introducción a la Biología
            Denisse Higareda
            Test ICFES Inglés Parte 1
            colrobomoyp
            Mapa conceptual de la materia.
            gaby271975
            Crisis de 1929 Nazismo Segunda Guerra Mundial Guerra Fría Naciones Unidas
            Fabian Pais
            TEOREMA DE PITAGORAS
            Alejandra GamboaMLLM
            ingles
            kanderkevin
            Límites
            Cesar Morgado
            Recursos Didácticos
            capomo.tutuli
            Teoría ética de Aristóteles.
            leiby johana briñez contreras