cyber security

Descripción

Mapa Mental sobre cyber security, creado por ryan brannigan el 11/06/2020.
ryan  brannigan
Mapa Mental por ryan brannigan , actualizado hace más de 1 año
ryan  brannigan
Creado por ryan brannigan hace más de 4 años
13
0

Resumen del Recurso

cyber security
  1. key terms
    1. un atorised entery
      1. un wanted access to your computer
      2. attack
        1. internet
          1. external
            1. caused out side of the orginisation
            2. incident
            3. cyber security
            4. hackers
              1. some one that gets into a compuer
                1. a person or thing that hacks technoligy
                2. types of threates
                    1. malware
                      1. pecifically designed to disrupt, damage, or gain unauthorized access to a computer system.
                        1. Trojan Horse:
                          1. Rootkit
                            1. Ransomware:
                              1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                              2. spyware
                                1. Is secretly installed to collect information from someone else's computer
                                2. keyloggers
                                  1. spyware that records every keystroke made on a computer to steal personal information
                              3. social enjenering
                                1. Shoulder Surfing/Shouldering
                                  1. It involves the attacker watching the victim while they provide sensitive information
                                  2. Phishing
                                    1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                                    2. Pharming
                                      1. s when a victim redirects the user from a genuine website to a fake one.
                                      2. Blagging/Pretexting
                                        1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                        2. Tailgating/Piggybacking
                                          1. Trying to gain access to a secure room or building.
                                          2. Baiting
                                            1. Cyber criminals make a promise of goods to get the information that they need.
                                          Mostrar resumen completo Ocultar resumen completo

                                          Similar

                                          CyberSecurity
                                          Stephen Williamson
                                          CSS exam
                                          Andy Oung
                                          cyber security
                                          Samuel Melendez
                                          Certified Information Systems Security Professional (CISSP)
                                          GoAsk Chaz
                                          Artificial Intellegence
                                          nicky elin
                                          Pears of Wisdom - Security Concepts
                                          Alex Poiry
                                          CSS exam_1
                                          Andy Oung
                                          Phishing Mindmap Salvy
                                          Salvy Ganpatsingh
                                          cyber security
                                          Jacqui Breeds
                                          Fórmulas Geométricas (Perímetros)
                                          Diego Santos
                                          FGM-3. REALES ORDENANZAS PARA LAS FUERZAS ARMADAS (I)
                                          antonio del valle