null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
23518058
cyber security
Descripción
Mapa Mental sobre cyber security, creado por Jonathan FREEMAN el 08/06/2020.
Sin etiquetas
key stage 3
Mapa Mental por
Jonathan FREEMAN
, actualizado hace más de 1 año
Más
Menos
Creado por
Jonathan FREEMAN
hace más de 4 años
7
0
2
Resumen del Recurso
cyber security
key terms
unauthorised access
refers to someone gaining entry without permision to a system
attack
a delibarate action targeting an organisations digital systems
threat
internal
incident inside an organisation
external
caused outside the organisation
an action that is delibarate
cyber security
refers to range of measures that can be taken to protect computer systems networks and data from unauthorised access or cyber attack
hackers
someone who seeks out and exploits these vulnerabilities.
Black hat hacker
someone who tries to inflict damage by compramising security systems
grey hat hacker
someone who does it for fun and not with malicious intent
white hat hacker
someone who works with organisation to strengthen the security systems
types of threats
malicious software
this an umbrella term given to a software that is designed to harm digital systems
virus
a piece of malicious code that attaches to a legitimate programme
worm
worms get around by exploiting vulnerbilities is digital systems
malware
trojan horse
users are tricked to download it onto their computers once installed it does the permitted task
Rootkit
designed to acceess and control a computer system without being detected
ransomware
encrypts files stored on a computer to steal money
spyware
secretly installed to collect information
key loggers
spyware that records every keystroke to steal information
adware
autimaticy shows adverts and popups
bot net
bots take control of the system without the user noticing
DDoS
social engineering
shoulder surfing
watching the victim over their shoulder while they put in information
phising
the victim recieves an email that looks serious but is a scam
pharming
the victim gets redirected from one website to a fake one
blagging
the attacker gives the victim a scenario so they give them money
tailgating
trying to gain access to secure a room or building
quid pro quo
cyber criminals make a promise and then they get what they need
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
CyberSecurity
Stephen Williamson
CSS exam
Andy Oung
cyber security
Samuel Melendez
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
Artificial Intellegence
nicky elin
Pears of Wisdom - Security Concepts
Alex Poiry
CSS exam_1
Andy Oung
Phishing Mindmap Salvy
Salvy Ganpatsingh
cyber security
Jacqui Breeds
Niveles de Organización de la Materia
Clara Bayer
Test 1. Unit 2
María Jordano de la Torre
Explorar la Librería