Cyber security

Descripción

Cyber security CS Year 8
Ruby Martin
Mapa Mental por Ruby Martin, actualizado hace más de 1 año
Ruby Martin
Creado por Ruby Martin hace más de 3 años
26
1

Resumen del Recurso

Cyber security
  1. Cyber attacks
    1. Hacking
      1. unauthorised access to computer material
      2. Phishing
        1. sending a fake email or message pretending to be from a bank or organisation, which tricks users into trying to log on to a fake website, stealing the login details
        2. Malware
          1. Malicious software, designed to cause harm
          2. Ransomware
            1. malware that encrypts users files and demands a ransom to decrypt them
            2. Botnet
              1. a network of computers which contain malware allowing them to be controlled by a hacker
              2. Keylogger
                1. malware that records every keypress and sends it to a hacker for analysis
              3. Cyber defences
                1. Security software
                  1. often called antivirus software even though it deals with more than just viruses, scans computers for known malware and removes it. Must be kept up to date with the latest malware definitions
                  2. White-hat hacking
                    1. hacking that is done with the authorisation of the company being hacked. The hacker produces a report of all the vulnerabilities they found, so that the company can fix them
                    2. Grey-hat hacking
                      1. hacking done without the authorisation of the company, but with good intentions, often the company will be informed of how the hacker was able to gain access
                      2. Backups
                        1. keeping a copy of important data on a different system, so that it can be restored if the original is damaged
                      3. Encryption
                        1. Cipher
                          1. a method of encrypting text
                          2. Plain text
                            1. the unencrypted data
                            2. Ciphertext
                              1. the encrypted data
                              2. Key
                                1. some information needed to encrypt/decrypt the data
                                2. Crack
                                  1. to read encrypted data without being given the key beforehand
                                  2. Brute force
                                    1. crack a cipher by trying every possible key until successful
                                    2. Statistical attack
                                      1. crack a cipher by using statistics and estimates of the most likely values
                                      2. Caeser cipher
                                        1. a simple cipher, where each letter is shifted a number of places up the alphabet
                                        2. Substitution cipher
                                          1. a simple cipher where each letter is replaced by a different letter
                                        Mostrar resumen completo Ocultar resumen completo

                                        Similar

                                        CyberSecurity
                                        Stephen Williamson
                                        CSS exam
                                        Andy Oung
                                        cyber security
                                        Samuel Melendez
                                        Certified Information Systems Security Professional (CISSP)
                                        GoAsk Chaz
                                        Artificial Intellegence
                                        nicky elin
                                        Pears of Wisdom - Security Concepts
                                        Alex Poiry
                                        CSS exam_1
                                        Andy Oung
                                        Phishing Mindmap Salvy
                                        Salvy Ganpatsingh
                                        cyber security
                                        Jacqui Breeds
                                        Fuentes del Derecho Romano
                                        Marisol González
                                        CALCULO INTEGRAL
                                        Jazlen G.A