System Threats

Descripción

malware mindmap
Ella Fisher Scott
Mapa Mental por Ella Fisher Scott, actualizado hace más de 1 año
Ella Fisher Scott
Creado por Ella Fisher Scott hace más de 7 años
18
0

Resumen del Recurso

System Threats
  1. Malware
    1. Definition
      1. Effects
        1. Prevention
          1. Computer protection programs, virus protecting software.
          2. Crash your computer, slow your internet connection, many of your files might be deleted.
          3. Malware—software written to infect computers and commit crimes such as fraud and identity theft.
        2. Phising
          1. Definiton
            1. Effects
              1. Prevention
                1. Strong security software such as firewall.
                2. Identity theft and confidential details being used as a different person, can prevent the original users account from being used
                3. Getting peoples trust and then taking their passwords and other personal information
              2. Brute Force Attack
                1. Definition
                  1. Effects
                    1. Prevention
                      1. Locks out after number of tries at guessing password.
                      2. Theft of data and access to private programs.
                      3. Guessing a password until you get it right and hack into an account.
                    2. Denial of Service Attack
                      1. Definition
                        1. Effects
                          1. Prevention
                            1. Strong security software, configuration of the webserver.
                            2. Revenue losses, productivity loss, reputation damage, activity loss.
                            3. Flooding a server with traffic causes servers to overload, preventing their response to legitimate clients.
                          2. Data interception and Theft
                            1. Definition
                              1. Effects
                                1. Prevention
                                  1. Strong encryption, virtual networks, network forensics.
                                  2. Username of passwords stolen, theft of data.
                                  3. Attacker monitors information and eventually gets information.
                                2. SQL injection
                                  1. Definition
                                    1. Effects
                                      1. Prevention
                                        1. Validation of input fields, using parameterised queries, rogue records can be added.
                                        2. Revealing private data, data can be deleted.
                                        3. Injection code into data and executed by data server.
                                      Mostrar resumen completo Ocultar resumen completo

                                      Similar

                                      Types and Components of Computer Systems
                                      Jess Peason
                                      Input Devices
                                      Jess Peason
                                      Output Devices
                                      Jess Peason
                                      Software Processes
                                      Nurul Aiman Abdu
                                      Computing
                                      Kwame Oteng-Adusei
                                      Software testing strategies: Summary
                                      harrymt
                                      Software Application
                                      Dim Ah
                                      Pack of playing cards answer
                                      Karl Taylor
                                      Code Challenge Flow Chart
                                      Charlotte Hilton
                                      Ciclos de los Elementos
                                      Diego Santos