null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12933079
1.6 system security
Description
1.1 - 1.8 Mind Map on 1.6 system security, created by liam oneill on 21/03/2018.
No tags specified
1.1 - 1.8
Mind Map by
liam oneill
, updated more than 1 year ago
More
Less
Created by
liam oneill
almost 7 years ago
53
0
0
Resource summary
1.6 system security
forms of attack
Malware
includes viruses, worms and trojan horses
worms
replicate itself in order to spread across a network
in order to do this it exploits vulnerabilities in a network
torjan horse
designed to access a computer by misleading the user of its intent
malicious software is designed to cause damage to a network or computer system
it attaches itself to files and programs on a computer system
phishing
designed to acquire sensitive information
commonly sent through email
telephone phishing
direct phone calls that pretend to be an official service
brute force
trial and error
can be used for gaining access to password-based entry systems
consists of an attacker entering possible passwords and phrases until one is correct
data interception and theft
packets that travel over networks can be intercepted
if packets are encrypted a key will be needed
packets reassembled by using a signature
SQL detection
social engineering
relies on human interaction
involves tricking users into breaking normal security procedures
DDOS
overloading a website with unwanted traffic
uses a number of computers over a network of infected machines which send requests to a website which would bring it offline
preventing attacks
penetration testing
tests conducted in a controlled envirmoent
network forensics
involves the examination of data sent across a network
packet sniffing
helps a user understand what is being sent across the network all the time
packet sniffing without written permission is a breach of the law
network policies
outline rules for network access
acceptable use policy (AUP)
anti malware software
aims to prevent malware from entering the system
firewalls
software that performs as a barrier
not 100% effective
can be held on a server or a stand alone computer
passwords
encryption
data is translated into code
julius ceasr
the key tells how many places along the alphabet the real letter is
user access levels
allows a system administrator to set up a hierarchy of users
lower level users = limited access
threats posed to networks
poor network policy
can expose a network to many threats
most networks restrict users to what they can and cant do
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
To Kill A Mockingbird
tommarlin15
Key Definitions for organic chemistry
katburr23
AP Chemistry
Cathal Darby
Cory & Manuel_1
Prudensiano Manu
Othello content knowledge quiz
rubyduggan
Touloper
field.sophie
Maths Revision
Asmaa Ali
Spanish Subjunctive
MrAbels
EOY Revision of Year 8 - Science
Luca Cameron
Testing for ions
Joshua Rees
Mapa Mental para Resumir y Conectar Ideas
Ricardo Padilla Alcantara
Browse Library