Cybersecurity Revision

Descripción

Mapa Mental sobre Cybersecurity Revision, creado por lewis dear el 15/03/2021.
lewis dear
Mapa Mental por lewis dear, actualizado hace más de 1 año
lewis dear
Creado por lewis dear hace más de 3 años
17
1

Resumen del Recurso

Cybersecurity Revision
  1. Cyberattacks
    1. Phishing
      1. definition: sending a afake email or message pretending to be from a bank or organisation, which tricks people into trying to log on to the fake website, stealing their login details
      2. Malware
        1. Ransomware
          1. definition: malware that encrypts users files and demands a ransom to decrypt them
          2. Botnets
            1. definition: a network of computers which contain malware allowing them to be controlled by a hacker
            2. Keyloggers
              1. definition: malware that records every keypress and sends it to a hacker for analysis
              2. Definition: malicious software, designed to cause harm
              3. Attempts to compromise a system or obtain unauthorised digital data (hacking)
              4. Cyber defences
                1. Security Software (antivirus)
                  1. definition: often called antivirus software even though it deals with more than just viruses, scans computers for known malware and removes it. Must be kept up to date with the latest malware definitions
                  2. white hat hacking
                    1. definition: – hacking that is done with the authorisation of the company being hacked. The hacker produces a report of all the vulnerabilities they found, so that the company can fix them
                    2. grey hat hacking
                      1. definition: – hacking done without the authorisation of the company, but with good intentions, often the company will be informed of how the hacker was able to gain access
                      2. backups
                        1. definition: keeping a copy of important data on a different system, so that it can be restored if the original is damaged
                        2. Techniques and systems to reduce the impact of cyberattacks
                        3. Encyption
                          1. Plaintext- the unencrypted data
                            1. Cipher- a method of encrypting text
                              1. Ciphertext- the encrypted data
                                1. Key- some information needed to encrypt/decrypt the data
                                  1. Crack- to read encrypted data without being given the key beforehand
                                    1. Brute force- crack a cipher by trying every possible key until successful
                                      1. Statistical attack- crack a cipher by using statistics and estimates of the most likely values
                                        1. Caesar cipher: a simple cipher, where each letter is shifted a number of places up the alphabet
                                          1. Substitution Cipher- a simple cipher where each letter is replaced by a different letter
                                          Mostrar resumen completo Ocultar resumen completo

                                          Similar

                                          1. LA CÉLULA
                                          Vivi Riquero
                                          Tema 2: Revoluciones liberales y movimientos nacionalistas en Europa
                                          Joaquín Ruiz Abellán
                                          Mind Mapping: 10 Estrategias para Docentes
                                          maya velasquez
                                          ¿Qué es el Antiguo Régimen?
                                          maya velasquez
                                          Deeper Learning
                                          maya velasquez
                                          Examen informática
                                          Cova M
                                          Cualidades del Sonido
                                          mariajesus camino
                                          MAPA MENTAL ANÁLISIS DE LOS DOCUMENTOS DE LA UNESCO Y EL MEN SOBRE COMPETENCIAS EN TIC PARA DOCENTES
                                          rocio.rocy007bon
                                          RAMAS DE LA INGENIERÍA
                                          Diana Mendoza
                                          Como disminuir la rotación de personal
                                          ale.chapa
                                          Mapa conceptual "Desarrollo Sustentable"
                                          Almendra Navidad