1.6 - Social Security

Description

GCSE Computing Mind Map on 1.6 - Social Security, created by eleanor croker on 28/02/2018.
eleanor croker
Mind Map by eleanor croker, updated more than 1 year ago More Less
Elissa Hill
Created by Elissa Hill almost 7 years ago
eleanor croker
Copied by eleanor croker almost 7 years ago
0
0

Resource summary

1.6 - Social Security
  1. Hacking Techniques
    1. Pharming
      1. Malicious code is installed on a personal computer or server
        1. Misdirects users to fraudulent web sites without their knowledge or consent
          1. A computer with a compromised host file will go to the fake Web site even if a user types in the correct internet address
          2. Blagging/pre-texting
            1. Creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances
              1. Like calling a credit card company as a spouse's and asking to change account details
              2. Shoulder surfing
                1. Looking over someone's shoulder when they are entering a passwod
                2. Baiting scenarios
                  1. Similar to phishing
                    1. A promise of an item or good that hackers use to attract victims
                      1. May offer users free music or movie downloads, if they surrender their login credentials to a certain site
                      2. Tailgating
                        1. Unauthorized person follows an authorized person to enter a secured premise
                        2. Quid-pro-quo
                          1. Hacker offers a service or benefit in exchange for information or access
                            1. Something for something
                            2. Hoax viruses
                              1. Message warning the recipients of a non-existent computer virus threat
                                1. Message is usually a chain e-mail that tells the recipients to forward it to everyone they know
                              2. Identifying and Preventing Techniques
                                1. Penetration Testing
                                  1. An authorized simulated attack on a computer system, performed to evaluate the security of the system.
                                  2. Network Forensics
                                    1. ...
                                    2. Network Policies
                                      1. ...
                                      2. Anti-malware Software
                                        1. ...
                                        2. Firewalls
                                          1. ...
                                          2. User Access Levels
                                            1. ...
                                            2. Passwords
                                              1. ...
                                              2. Encryption
                                                1. ...
                                              Show full summary Hide full summary

                                              Similar

                                              Types and Components of Computer Systems
                                              Jess Peason
                                              Input Devices
                                              Jess Peason
                                              Output Devices
                                              Jess Peason
                                              Computing
                                              Kwame Oteng-Adusei
                                              Pack of playing cards answer
                                              Karl Taylor
                                              Code Challenge Flow Chart
                                              Charlotte Hilton
                                              Computing Hardware - CPU and Memory
                                              ollietablet123
                                              Computer Systems
                                              lisawinkler10
                                              Computer science quiz
                                              Ryan Barton
                                              Input, output and storage devices
                                              Mr A Esch
                                              GCSE Computing - 4 - Representation of data in computer systems
                                              lilymate