Why are systems attacked

Descripción

Mapa Mental sobre Why are systems attacked, creado por Huey FREEMAN el 01/05/2020.
Huey FREEMAN
Mapa Mental por Huey FREEMAN, actualizado hace más de 1 año
Huey FREEMAN
Creado por Huey FREEMAN hace más de 4 años
32
0

Resumen del Recurso

Why are systems attacked
  1. fun/challenge
    1. hacking systems can be fun or a challenge
      1. their is a sense of achievement
        1. friends may give respect for the hacking achievment
        2. distruption
          1. attacks such as Denial-Of-Service stop websites working
            1. viruses can slow down computers and delte files
            2. financial gains
              1. ransoms can be made to prevent attacks from happening
                1. ransomware can be used to encrypt a computer until you pay
                  1. a payment is given to carry out an attack on a organisatioon
                  2. Industrial espionage
                    1. the aim is to find intellectual property such as designs or blueprints for products , business stratagies or software source code
                    2. personal attack
                      1. employees that are unhappy might try and attack the company
                        1. friends/family may attack each other if upset over something
                      2. information/data theft
                        1. credit card and financial details are stolen to gain money
                          1. company information may also be stolen
                          2. Malware
                            1. Malicious Software
                              1. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                              2. Virus
                                1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                2. Worm
                                  1. Similar to virus but unlike a virus it is a self contained program. It is capable of spreading on it own, without help from humans. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                  2. Trojan Horse
                                    1. is a type of malware that is often disguised as legitimate software.
                                  Mostrar resumen completo Ocultar resumen completo

                                  Similar

                                  9) Sport activities
                                  John Goalkeeper
                                  Ecuaciones diferenciales lineales de segundo orden
                                  Juan Beltran
                                  MATEMÁTICAS PRIMARIA
                                  Ulises Yo
                                  Química Orgánica
                                  pedro.casullo
                                  Pasos para la ejecución de un emprendimiento
                                  lamconsultoria
                                  Verb to be - Present simple test
                                  r.fernandez7858044
                                  TIC APLICADA A LA EDUCACIÓN INICIAL
                                  rosita_20_13
                                  Mapa mental: Sinónimos y Antónimos
                                  mariela.bolanos
                                  REGISTROS DE CUENTAS CONTABLES
                                  islena olivero
                                  CONCEPTOS BÁSICOS DE INTELIGENCIA
                                  Edgar Sarzosa
                                  HINDUISMOA 6B_ANE
                                  Ane Núñez Escudero