Cyber Security

Descripción

Mapa Mental sobre Cyber Security, creado por Violette JENKINSON el 08/06/2020.
Violette JENKINSON
Mapa Mental por Violette JENKINSON, actualizado hace más de 1 año
Violette JENKINSON
Creado por Violette JENKINSON hace más de 4 años
17
0

Resumen del Recurso

Cyber Security
  1. Key terms
    1. Threat
      1. External
        1. Caused outside the organisation.
        2. Internal
          1. Caused by an incident inside an organisation.
          2. An incident or action which is deliberate or unintended, that results in disruption, down time or data loss.
          3. Attack
            1. An attack is a deliberate action, targeting an organisations digital system or data.
            2. Unauthorised access
              1. Cyber security
              2. Hackers
                1. Someone who seeks out and exploits these vulnerabilities.
                  1. Black hat hackers
                    1. Someone who tries to inflict damage by compromising security systems.
                    2. Grey hat hackers
                      1. Someone who does it for fun and not in malicious intent.
                      2. White hat hackers
                        1. someone who works with organizations to strengthn the security of the system.
                      3. Types of threats
                        1. Malware
                          1. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                            1. Malicious software
                              1. Trojan horse.
                                1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                                2. Rootkit.
                                  1. Designed to remotely access and control a computer system without being detected by security software or the user.
                                  2. Ransomware.
                                    1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                                    2. Spyware.
                                      1. Is secretly installed to collect information for someone else's computer.
                                      2. Keyloggers.
                                        1. Spyware that records every keystroke made on a computer to steal personal information.
                                        2. Adware
                                          1. Automatically shows adverts such as popups.
                                            1. Most adware is harmless but some contain spyware such as key loggers.
                                        3. Virus
                                          1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself, and usually capable of causing great harm to files or other programs on the same computer.
                                          2. Worm
                                            1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                          3. Social engineering
                                            1. A set of methods used by cybercriminals to deceive individuals to handing over information that can be used for fraudulent purposes.
                                              1. Shoulder surfing/Shouldering
                                                1. It involves the attacker watching the victim while they provide sensitive information. (e.g. watching someone put in their pin at a cash point).
                                                2. Phishing
                                                  1. Is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them to giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                                                  2. Pharming
                                                    1. Is when a victim redirects the user from a genuine website to a fake one.
                                                    2. Blagging/Pretexting
                                                      1. An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                                        1. Blagging and pretexting does not just happen on an email, it happens on the phone too.
                                                        2. Tailgating/Piggybacking
                                                          1. Try to gain access to a secure room or building.
                                                            1. E.g A common example is someone pretends to be a delivery driver and asking an authorised person to hold the door so they can enter the building.
                                                          2. Baiting
                                                            1. Cyber criminals to make a promise of goods to get the information that they need
                                                              1. E.g promise free downloads to a film for login details.
                                                          Mostrar resumen completo Ocultar resumen completo

                                                          Similar

                                                          CyberSecurity
                                                          Stephen Williamson
                                                          CSS exam
                                                          Andy Oung
                                                          cyber security
                                                          Samuel Melendez
                                                          Certified Information Systems Security Professional (CISSP)
                                                          GoAsk Chaz
                                                          Artificial Intellegence
                                                          nicky elin
                                                          Pears of Wisdom - Security Concepts
                                                          Alex Poiry
                                                          CSS exam_1
                                                          Andy Oung
                                                          Phishing Mindmap Salvy
                                                          Salvy Ganpatsingh
                                                          cyber security
                                                          Jacqui Breeds
                                                          La Guerra Civil Española
                                                          maya velasquez
                                                          Finanzas
                                                          marcov7154