Learning Aim B: Cyber security

Description

Mind Map on Learning Aim B: Cyber security, created by Luke WATERS on 01/05/2020.
Luke WATERS
Mind Map by Luke WATERS, updated more than 1 year ago
Luke WATERS
Created by Luke WATERS over 4 years ago
23
0

Resource summary

Learning Aim B: Cyber security
  1. Cyber Security
    1. Refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyber attack.
    2. Threat
      1. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
        1. Internal
          1. Caused by an incident inside an organisation
          2. External
            1. Caused outside the organisation
        2. Attack
          1. An attack is a deliberate action, targeting an organisation's digital system or data.
          2. Unauthorised Access
            1. This refers to someone gaining entry without permission to an organisation's system, software or data
              1. Hacker
                1. Black Hat
                  1. They try to inflict damage by compromising security systems
                  2. Grey Hat
                    1. Do it for fun and not with malicious intent
                    2. White
                      1. Working with organisations to strength the security of a system
                2. Why are systems attacked?
                  1. Fun/Challenge
                    1. - Hacking systems can be fun or a challenge
                      1. There is a sense of achievement
                        1. Friends may give respect of hacking achievements
                    2. Financial gain
                      1. Ransoms can be made to prevent attacks form happening
                        1. Ransomware can be used to encrypt a computer until you pay
                          1. A payment is given to carry out an attack on an organisation
                      2. Dispution
                        1. Attacks such as Denial-of-Service stop websites working
                          1. Viruses can slow down computers and delete files
                        2. Industrial Espionage - Spying in companies
                          1. The aim is find intellectual property such as designs or blueprints for products, business strategies or software sort code
                          2. Personal attack
                            1. Employees that are unhappy may attack the company
                              1. Friends / family may attack each other if upset over something
                            2. Information/ Data Theft
                              1. Credit card and financial details are stolen to gain money
                                1. Company information may also be stolen
                            3. Malware
                              1. Malicious Software
                                1. This an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information
                                  1. Virus
                                    1. A piece of malicious code that attaches to a legitimate program. it is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                    2. Worm
                                      1. Similar to virus but unlike a virus but unlike a virus it is a self contained program. It is capable of spreading on it own, without help from humans. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                  Show full summary Hide full summary

                                  Similar

                                  Volcanoes
                                  1jdjdjd1
                                  Energy, Mass, & Conversions
                                  Selam H
                                  OCR AS Biology - Lipids
                                  Chris Osmundse
                                  Macbeth Notes
                                  Bella Ffion Martin
                                  Chemistry
                                  Holly Bamford
                                  Of Mice and Men - Themes
                                  Hafsa A
                                  Life in Germany
                                  Ben C
                                  The Weimar Republic, 1919-1929
                                  shann.w
                                  Key policies and organisations Cold War
                                  E A
                                  World War One
                                  Micheal Heffernan
                                  2_PSBD HIDDEN QUS By amajad ali
                                  Ps Test