learning aim b: cyber security

Descripción

Mapa Mental sobre learning aim b: cyber security, creado por Keane MEEK el 01/05/2020.
Keane MEEK
Mapa Mental por Keane MEEK, actualizado hace más de 1 año
Keane MEEK
Creado por Keane MEEK hace alrededor de 4 años
6
0

Resumen del Recurso

learning aim b: cyber security
  1. key terms
    1. threat
    2. why systems are attacked
      1. malware
        1. trojan horse

          Nota:

          • users are tricked into downloading it. 
          1. rootkit

            Nota:

            • is a set of tools that give a hacker high level administrative control of a computer.
            1. ransomware

              Nota:

              • encrypted files stored on a computer to exort or steal money from organisations.
              1. spyware

                Nota:

                • malicious software secretly installed to collect information from someone elses computer.
                1. keyloggers

                  Nota:

                  • spyware that records every keystroke made on a computer to steal personal information.
          2. botnet

            Nota:

            • is an army of zombie devices used to carry out mass attacks and send spam to millions of users.
            1. DDOS

              Nota:

              • flooding a website with useless traffic to inundate and overwhelm the network.
          3. social engineering

            Nota:

            • involves tricking people into divulging valuable information about themselves.
            1. phishing

              Nota:

              • a way of attempting to acquire information by pretending to be from a trustworthy source.
              1. spear phishing

                Nota:

                • involves bespoke emails being sent to well searched victims.
                1. blagging

                  Nota:

                  • a blagger invents a scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
                  1. shoulder surfing

                    Nota:

                    • acquiring sensitive information by someone peering over a users shoulder when they are using a device.
                    1. pharming

                      Nota:

                      • involves redirecting people to bogus look a like websites without realising it has happened. 
                      1. man in the middle attack

                        Nota:

                        • a form of eavesdropping where the attacker makes a independent connection between two victims and steals information to use fraudulently. 
            Mostrar resumen completo Ocultar resumen completo

            Similar

            Capítulo III. Procesos de dirección de proyectos
            molo544
            MONUMENTOS...
            JL Cadenas
            Brainstorming con Mapas Mentales
            Diego Santos
            Gramática Inglés
            Diego Santos
            Ecuaciones Estadísticas
            Diego Santos
            La Guerra Civil Española
            maya velasquez
            ARISTÓTELES
            maya velasquez
            Romanticismo literario del S. XIX
            maya velasquez
            Mapas mentales con GoConqr
            maya velasquez
            ANATOMÍA...
            Ulises Yo