Cyber Security

Descripción

Mapa Mental sobre Cyber Security, creado por Charlotte WEATHERLEY el 08/06/2020.
Charlotte WEATHERLEY
Mapa Mental por Charlotte WEATHERLEY, actualizado hace más de 1 año
Charlotte WEATHERLEY
Creado por Charlotte WEATHERLEY hace más de 4 años
12
0

Resumen del Recurso

Cyber Security
  1. KEY TERMS
    1. Unauthorised Access
      1. This refers to someone gaining entry without permission to an organisation’s system, software or data.
      2. Cyber Security
        1. refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
        2. Threat
          1. External
            1. caused outside the organisation
            2. Internal
              1. caused by an incident inside an organisation
              2. is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss
              3. Attack
                1. an attack is a deliberate action, targeting an organisation's digital system or data.
              4. Hackers
                1. Black Hat Hacker
                  1. is someone who tries to inflict damage by compromising security systems
                  2. Grey Hat Hacker
                    1. is someone who does it for fun and not with malicious intent
                    2. White Hat Hacker
                      1. is someone who works with organizations to strengthen the security of a system
                      2. is someone who seeks out and exploits these vulnerabilities.
                      3. Types of Threats
                        1. MALWARE
                          1. Virus
                            1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                            2. Worm
                              1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                              2. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                                1. Trojan Horse
                                  1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                                  2. Rootkit
                                    1. Designed to remotely access and control a computer system without being detected by security software or the user.
                                    2. Ransomware
                                      1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                                      2. Spyware
                                        1. Is secretly installed to collect information from someone else's computer
                                        2. Keyloggers
                                          1. spyware that records every keystroke made on a computer to steal personal information
                                          2. Adware
                                            1. Automatically shows adverts such as popups. Most adware is harmless
                                            2. Botnet
                                              1. Bots take control of a computer system, without the user’s knowledge. A botnet is a large collection of malware-infected devices (zombies). An attacker (‘bot herder’) chooses when to ‘wake’ the zombies to perform an attack.
                                              2. DDoS (Distributed Denial-of-Service attack)
                                                1. flooding a website with useless traffic to inundate and overwhelm the network
                                            3. Social Engineering
                                              1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes
                                                1. Shouldering
                                                  1. It involves the attacker watching the victim while they provide sensitive information
                                                  2. Phishing
                                                    1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                                                  Mostrar resumen completo Ocultar resumen completo

                                                  Similar

                                                  CyberSecurity
                                                  Stephen Williamson
                                                  CSS exam
                                                  Andy Oung
                                                  cyber security
                                                  Samuel Melendez
                                                  Certified Information Systems Security Professional (CISSP)
                                                  GoAsk Chaz
                                                  Artificial Intellegence
                                                  nicky elin
                                                  Pears of Wisdom - Security Concepts
                                                  Alex Poiry
                                                  CSS exam_1
                                                  Andy Oung
                                                  Phishing Mindmap Salvy
                                                  Salvy Ganpatsingh
                                                  cyber security
                                                  Jacqui Breeds
                                                  Resumen de Selectividad Inglés
                                                  maya velasquez
                                                  Mesoamerica- Linea del tiempo
                                                  jonyjr1