null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
23518058
cyber security
Description
Mind Map on cyber security, created by Jonathan FREEMAN on 08/06/2020.
No tags specified
key stage 3
Mind Map by
Jonathan FREEMAN
, updated more than 1 year ago
More
Less
Created by
Jonathan FREEMAN
over 4 years ago
7
0
2
Resource summary
cyber security
key terms
unauthorised access
refers to someone gaining entry without permision to a system
attack
a delibarate action targeting an organisations digital systems
threat
internal
incident inside an organisation
external
caused outside the organisation
an action that is delibarate
cyber security
refers to range of measures that can be taken to protect computer systems networks and data from unauthorised access or cyber attack
hackers
someone who seeks out and exploits these vulnerabilities.
Black hat hacker
someone who tries to inflict damage by compramising security systems
grey hat hacker
someone who does it for fun and not with malicious intent
white hat hacker
someone who works with organisation to strengthen the security systems
types of threats
malicious software
this an umbrella term given to a software that is designed to harm digital systems
virus
a piece of malicious code that attaches to a legitimate programme
worm
worms get around by exploiting vulnerbilities is digital systems
malware
trojan horse
users are tricked to download it onto their computers once installed it does the permitted task
Rootkit
designed to acceess and control a computer system without being detected
ransomware
encrypts files stored on a computer to steal money
spyware
secretly installed to collect information
key loggers
spyware that records every keystroke to steal information
adware
autimaticy shows adverts and popups
bot net
bots take control of the system without the user noticing
DDoS
social engineering
shoulder surfing
watching the victim over their shoulder while they put in information
phising
the victim recieves an email that looks serious but is a scam
pharming
the victim gets redirected from one website to a fake one
blagging
the attacker gives the victim a scenario so they give them money
tailgating
trying to gain access to secure a room or building
quid pro quo
cyber criminals make a promise and then they get what they need
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
CyberSecurity
Stephen Williamson
CSS exam
Andy Oung
cyber security
Samuel Melendez
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
Artificial Intellegence
nicky elin
Pears of Wisdom - Security Concepts
Alex Poiry
CSS exam_1
Andy Oung
Phishing Mindmap Salvy
Salvy Ganpatsingh
cyber security
Jacqui Breeds
Key Shakespeare Facts
Andrea Leyden
chemistry: c2
kristy baker
Browse Library