null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12931978
1.6 System Security V2 Joshua Guerrero
Description
Mind Map on 1.6 System Security V2 Joshua Guerrero, created by Joshua G on 21/03/2018.
No tags specified
gcse
Mind Map by
Joshua G
, updated more than 1 year ago
More
Less
Created by
Joshua G
over 6 years ago
22
0
0
Resource summary
1.6 System Security V2 Joshua Guerrero
Malware
Damage the computer or network
Malware scanner
Anti-Virus
Malware scanner
Viruses
Attaches to a program or a file .This can affect all components of an operating system .
Worms
Replicates itslef and spreads to other computers
Does not need to attach to a file
Social Engineering
This involves someone using data from a program.This does not revolve around technical cra
Data Interperception
When they interact with packets that are going to a certain place
The Packets are encrypted
Network policy
AUP
aceptable use policy
Brutle force attack
Trial and error
This is trying to access based entry system
An attack that attempts to decode passwords/encryption keys/encrypted data
DDOS
Overload a website with unwanted trafic
Uses a number of computers over a network .To bring the network offline
SQL
Where an attacker can execute can execute malicious SQL statements using software which controls a database management system
When exploits are found they need to be patched
They get customer data,intellectual property and sensitive information
Network forensic
A branch of digital forensics
Covers the forensic investigations of networks and their devices attached to them
Ciphertext
Normal :A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ciphertext:X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Firewall
Advantages
Controls network traffic/allows data from authorised
Blocks data from unauthorised sources
Protects against attackers
Strong Passwords
At least eight characters
Include upper case
Include lower case
Include special characters
Include numbers
Does not include a name, company name or user name
Does not contain a complete word
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Jung Quiz
katprindy
IB Biology Topic 4 Genetics (SL)
R S
Mapa Mental para Resumir y Conectar Ideas
Marko Salazar
GCSE Geography - Causes of Climate Change
Beth Coiley
AQA GCSE Product Design Questions
Bella Statham
GCSE REVISION TIMETABLE
megangeorgia03
Contract Law
sherhui94
The Lymphatic System
james liew
DEV I Part II
d owen
GENERAL PRACTICE-1
Luis Felipe Chávez Choque
The Gastrointestinal System- Physiology- PMU
Med Student
Browse Library