malware

Description

Mind Map on malware, created by Tobias JACKSON on 05/05/2020.
Tobias JACKSON
Mind Map by Tobias JACKSON, updated more than 1 year ago
Tobias JACKSON
Created by Tobias JACKSON over 4 years ago
10
0

Resource summary

malware
  1. fun/challenge
    1. friends may give respect of hacking achievements
      1. hacking systems can be fun or challenging
        1. there is a sense of achievement
        2. finical gain
          1. ransoms can be made to prevent attacks from happening
            1. ransoms can be made to encrypt a computer until you pay
              1. a payment is given to carry out an attack on an organisation
              2. Disruption
                1. attacks such as denial of service stop websites working
                  1. virus can slow down computer and delete files
                  2. industrial espionage and spying in companies
                    1. the aim is to find out intellectual property such as designs or blueprints for products, buisness strategy or software security codes
                    2. personal attack
                      1. employees that are unhappy may attack the company
                        1. friends/family may attck each other if upset over something
                        2. information/data theft
                          1. company information may also be stolen
                            1. credit card and financial details are stolen to gain money
                            Show full summary Hide full summary

                            Similar

                            Computer Security
                            Mr A Esch
                            Hacking quiz
                            Luigi3106 YT
                            security threats
                            jacob stenning
                            Chapter 5: Keeping data safe and secure, keywords
                            Victoria Heppinstall
                            System Threats
                            Lana-Mae Garrett
                            VIRUS INFORMÁTICO
                            FRANKLIN ANILEMA
                            Riesgos en internet
                            Julieth del Carmen Aroca Diaz
                            Chapter 5: Keeping data safe and secure overview
                            Victoria Heppinstall