Cyber Security

Description

Year 10 IT Mind Map on Cyber Security, created by Gemma BRACE on 08/06/2020.
Gemma BRACE
Mind Map by Gemma BRACE, updated more than 1 year ago
Gemma BRACE
Created by Gemma BRACE over 4 years ago
16
0

Resource summary

Cyber Security
  1. KEY TERMS
    1. unauthorised Access
      1. Gaining entry to an organisation's system, software, without permission to. This is achieved through exploiting a security vulnerability.
      2. Cyber Security
        1. A range of measures taken to protect computer systems, networks and data from unauthorised access or cyberattacks
        2. Threat
          1. An incident or action which is deliberate, which results in disruption, downtime or data loss.
            1. External Threat
              1. Caused outside the organisation
              2. Internal Threat
                1. Caused by an incident inside of an organisation
            2. Attack
              1. A deliberate action, targeting an organisation's digital system or data
            3. HACKERS
              1. Someone who seeks out and exploits these vulnerability
                1. Black Hat Hacker
                  1. Someone who tries to inflict damage by compromising security systems
                  2. Grey Hat Hacker
                    1. Someone who does it for fun and not with malicious intent
                    2. White Hat Hacker
                      1. Someone who works with organisations to strengthen the security of a system
                    3. TYPES OF THREATS
                      1. Malware
                        1. Malicious software. This is an umbrella term given to software which is designed to harm a digital system, damage data or harvest sensitive information
                          1. Virus
                            1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                            2. Worm
                              1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                              2. Trojan Horse
                                1. Users are tricked into downloading it to their computers. Once installed the Trojan works undercover to carry out a predetermined task.
                                2. Rootkit
                                  1. Designed to remotely access and control a computer system without being detected by security software of the user.
                                  2. Ransomware
                                    1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                                    2. Spyware
                                      1. Is secretly installed to collect information from someone else's computer.
                                      2. Keyloggers
                                        1. Spyware that records every keystroke made on a computer to steal personal information.
                                        2. Adware
                                          1. Automatically shows adverts such as popups. Most adware is harmless but some contain spyware such as keyloggers.
                                          2. Distributed Denial-of-service attack (DDoS attack)
                                            1. Flooding a website with useless traffic to inundate and overwhelm the network.
                                            2. Botnet
                                              1. Bots take control of computer systems , without users knowledge. A botnet is a large collection of malware-infected devices(zombies). An attacker (bot herder)chooses when to 'wake' the zombies to perform an attack.
                                          3. Social Engineering
                                            1. Is a set of methods used by cybercrimminals to decieve individuals into handing over information that they can use for fraudulent purposes.
                                              1. Shoulder surfing/shouldering
                                                1. Involves the attacker watching a victim while they provide sensitive information.
                                                2. Phishing
                                                  1. Is an attack in which a victim recieves an email disguised to look as if it has come from a ruptable source,in order to trick them into giving valuable data.
                                                    1. This email usually provides a link to another website where the information can be imputted.
                                                  2. Pharming
                                                    1. Is when a victim redirects the user from a genuine website to a fake one.
                                                      1. Some phrming sites are so expertly copied from the genuine website that it is very difficult to identify therefore this is carried out without the user knowing about it.
                                                    2. Blagging/Pretexting
                                                      1. Is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                                      2. Tailgating/ piggybacking
                                                        1. Trying to gain access to a secure room or building.
                                                        2. Baiting
                                                          1. Cyber crimminals make a promise of goods to get information that they need.
                                                          2. Quid pro quo
                                                            1. cyber crimminals make a promise of service to get information they need.
                                                          Show full summary Hide full summary

                                                          Similar

                                                          Common Technology Terms
                                                          Julio Aldine Branch-HCPL
                                                          Project Communications Management
                                                          farzanajeffri
                                                          Network Protocols
                                                          Shannon Anderson-Rush
                                                          Abstraction
                                                          Shannon Anderson-Rush
                                                          Computing
                                                          Kwame Oteng-Adusei
                                                          HTTPS explained with Carrier Pigeons
                                                          Shannon Anderson-Rush
                                                          Introduction to the Internet
                                                          Shannon Anderson-Rush
                                                          CyberSecurity
                                                          Stephen Williamson
                                                          Construcción de software
                                                          CRHISTIAN SUAREZ
                                                          Historical Development of Computer Languages
                                                          Shannon Anderson-Rush
                                                          Useful String Methods
                                                          Shannon Anderson-Rush