Encryption and Security

Descripción

A-Level Computing Mapa Mental sobre Encryption and Security, creado por nick.mason1998 el 14/12/2015.
nick.mason1998
Mapa Mental por nick.mason1998, actualizado hace más de 1 año
nick.mason1998
Creado por nick.mason1998 hace alrededor de 9 años
17
0

Resumen del Recurso

Encryption and Security
  1. Encryption
    1. Threats

      Nota:

      • Any computer is at risk in someway from threats. A computer on a network especially so. The larger the network, the greater the threat.
      1. Types of Threat
        1. Intrusion ("Hacking")

          Nota:

          • This involves manual compromising a computer or network's security.
          • It typically involves taking files from the system, but can also involve taking control of parts of or all of the system
          1. Denial of Service (DoS)

            Nota:

            • DoS is where a server is overwhelmed by requests and is forced to shut down, often leaving holes in security if the server acted as a firewall or similar security device.
            • A DDoS attack (Dedicated DoS) is the most common type and involves an individual or group sending huge volumes of blank or unintelligible requests to the server they intend to attack. Sometimes this is to spitefully take a website down, although sometimes it is intended to leave holes in the security for intrusion to take place or to allow malware into the system.
            1. Viruses, Worms and Trojans
              1. Virus

                Nota:

                • A virus is a malware program that attaches to a host program and replicates itself, either in another computer on a network or in other parts of the computer.
                1. Worm

                  Nota:

                  • A worm is a malware program that replicates itself to spread itself, typically through a network.
                  • Unlike a virus, a worm does not need to attach to an existing program. 
                  1. Trojan

                    Nota:

                    • A Trojan is a piece of malware that masquerades as a regular piece of software. Often mistakenly installed by the user with other downloads, although it sometimes comes in an install the user thought was an important or necessary install.
                    • Spyware tends to be delivered as a trojan.
                    • Trojans rarely replicate themselves.
                  2. Spyware

                    Nota:

                    • Software that covertly gathers information off of a victim's computer and transmits it. Often used to gather login details and credit card details.
                    1. Scams
                      1. Information Theft
                        1. Phishing

                          Nota:

                          • Phishing uses emails or websites that are designed to look like legitimate websites in order to steal details and/or place malware on a system.
                          1. Pharming

                            Nota:

                            • A scam that involves misdirecting a user to a scam website, often using holes in the DNS system.
                      2. Security
                        1. Types of Security
                          1. Encryption
                            1. Firewalls
                              1. Definition
                                1. How They Work
                                  1. The Flaws
                                  2. Anti-Virus
                                2. Wireless Networks
                                  1. Vulnerable

                                    Nota:

                                    • Wireless Networks are particularly vulnerable owing to their very nature.
                                    • As they are always transmitting they are also easy to find. There is also no need to be on a workstation wired on the network, meaning one does not have to access the site to access the network. 
                                    1. Security Methods
                                      1. WEP/WPA Encryption
                                        1. WEP

                                          Nota:

                                          • Wired Equivalent Privacy was the most commonly used security algorithm until it was superseded by WPA.
                                          1. WPA

                                            Nota:

                                            • Wi-Fi Protected Access is the current standard in wireless network security. It replaced WEP due to its greater security credentials.
                                          2. MAC Address Filtering

                                            Nota:

                                            • MAC Address filtering involves keeping a list of MAC addresses approved for the network. As a MAC address is tied to a machine this, in theory, means only approved users can access the network. It is typically tied to a login portal.
                                            • It is not infallible however.
                                            1. Spoofing

                                              Nota:

                                              • Spoofing is where a device is set up so as to pretend it has a different MAC address from its actual one. This is typically to fool MAC Adress Filtering as it will then believe that the address is a valid one, hence the backup of the login portal.
                                            2. Secure Admin Password

                                              Nota:

                                              • Secure admin passwords make it harder to access accounts with a lot of permissions. This means that any breaches can be contained to only the parts of the network the compromised account can access.
                                              1. Reduced Signal Strength

                                                Nota:

                                                • Reducing the signal strength means that only those on or very near the site are able to access the network. While it results in slower network speeds for almost everyone, it also limits the risk of unauthorised access.
                                                • This is particularly important, and fairly effective, for sensitive organisations. For example intelligence agencies can make the network very difficult to access as the site itself is hard to gain entry to.
                                                1. Login Portal

                                                  Nota:

                                                  • A login portal may or may not work in conjunction with MAC Address Filtering, though secure networks will often employ both.
                                                  • Login portals require the user, upon connecting to the wireless network, to log in to the system, typically with an intranet password. This is designed so that the person using the device can be confirmed. There are workarounds but using multiple layers of security can combat this.
                                              Mostrar resumen completo Ocultar resumen completo

                                              Similar

                                              Types and Components of Computer Systems
                                              Jess Peason
                                              Input Devices
                                              Jess Peason
                                              Output Devices
                                              Jess Peason
                                              Computing
                                              Kwame Oteng-Adusei
                                              Pack of playing cards answer
                                              Karl Taylor
                                              Code Challenge Flow Chart
                                              Charlotte Hilton
                                              Encryption Work
                                              Alex Rollin
                                              Computer science quiz
                                              Ryan Barton
                                              Input, output and storage devices
                                              Mr A Esch
                                              GCSE Computing - 4 - Representation of data in computer systems
                                              lilymate
                                              AUTORES-LIBROS
                                              ROSA MARIA ARRIAGA