null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
8873708
System Threats
Descripción
6 Cyber threats
Sin etiquetas
system
threat
computing
work
computing
year 10
Mapa Mental por
Jasmine Farmand
, actualizado hace más de 1 año
Más
Menos
Creado por
Jasmine Farmand
hace más de 7 años
9
0
0
Resumen del Recurso
System Threats
Malware
It's used for many different reasons which include:
Disrupting computer systems
Gaining sensitive info
Gaining access to private systems
Displaying unwanted adverts
Methods
Viruses
Worms
Scareware
Trojan horses
Spybots
Prevention
Installing anti-virus software
Always updating systems whenever possible
Think before clicking
Always backing up files
Malicious software is used to gain access to and damage computers without consent
Effects
Computer crashing or slowing down
Files may be deleted, stolen, corrupted, encrypted or changed
They may record your keystrokes to gain passwords, bank info, usernames etc
Phishing
How is it done?
Usually an email or message will be sent to the victim
It will either ask for money or link you to a fake website that looks real
The victim then enters their info on this website into the hands of the online criminals
What is gained?
Bank details
Usernames
Passwords
Preventions
Learn the signs that an email or website is fishy
Promote gifts, similar business logos, real name of employees, spelling mistakes in the email etc.
Safe websites begin with https:// and have a closed lock icon so only enter info on these sites
Strong protection
Disable pop-ups
What is it?
Phishing is the attempt to gain sensitive information from peoplethrough email/instant messenger
Brute force attack
What is it?
It's when an attacker tries many passwords in the hope of guessing correctly with one
How does it work?
It works by calculating every possible combination that could make up a passwords length
Prevention
Longer passwords can take decades to crack whereas short passwords can be discovered quickly
So create a long password with a mix of characters and numbers
Don't use dictionary words or slightly modified words as it is easy to guess
Locking accounts after failed guess attempts but this has its own problems
Captcha
What do they gain?
Theft of data
Access to private systems
Denial of service attack
What is it?
It's an attack launched on a network or website
DOS attacks are different, some can be relatively harmeless whilst others are infected with trojans
How?
Cyber criminals flood the target with useless requests or log in requests
This grinds the system to a halt
Malware can be used to control many computers to launch this attack ('zombies') which all send requests at the same time
Why and what is gained?
Extortion - Attackers can demand money to stop the attack (although success rate is low)
Sometimes people who DOS are hired to launch an attack on a rival company
To show their disapproval to a game, or the government, for example
To distract a network/company to perform other attacks
Results in a the compan/network losing reputation, time and money
Prevention
There isn't really a way to prevent an attack but making a plan if it happens,
constantly patching up vulnerabilities,
and having a strong firewall are ways to minimise damage
Packet filters on roters
SQL Injection
What is it?
SQL's a programming language and a hacker uses it to target a database or website form
How?
When the form asks for input, an SQL statement is entered which runs and allows the user...
...to control or change data in the database
Prevention
Lock down database servers and remove backdoors
Change default admin passwords
Prevention testing
Effects
Revealing data that's hidden
Data is controlled,stolen or changed
Data interception
What is it?
When a hacker intercepts data packets when they are being sent without the user knowing
How?
A hacker uses data packet analysers to intercept data packets when they are sent from a computer
Why, what do they gain?
Hackers gain things such as logins,passwords,credit cand numbers and PIN's
Prevention
Using data encrypting techniques so the hacker will get useless info
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
OCR gcse computer science
Jodie Awthinre
The Norman Conquest 1066-1087
adam.melling
Computing Hardware - CPU and Memory
ollietablet123
Physics Review!
Nicholas Weiss
Explorar la Librería