Cyber Security

Description

Mind Map on Cyber Security, created by Nikodem HARA on 08/06/2020.
Nikodem HARA
Mind Map by Nikodem HARA, updated more than 1 year ago
Nikodem HARA
Created by Nikodem HARA over 4 years ago
7
0

Resource summary

Cyber Security
  1. Key Terms
    1. Cyber Security
      1. refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
      2. Threat
        1. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
          1. Internal Threat = caused by an incident inside an organisation
            1. External Threat = caused outside the organisation
          2. Attack
            1. An attack is a deliberate action, targeting an organisation’s digital system or data.
            2. Unauthorized Access
              1. This refers to someone gaining entry without permission to an organisation’s system, software or data.
                1. This is achieved by exploiting a security vulnerability
            3. Hackers
              1. Hacker
                1. Is someone who seeks out and exploits these vulnerabilities.
                2. Black Hat Hackers
                  1. Is someone who tries to inflict damage by compromising security systems
                  2. Grey Hat Hackers
                    1. Is someone who does it for fun and not with malicious intent
                    2. White Hat Hackers
                      1. Is someone who works with organisations to strengthen the security of a system
                    3. Types of threats
                      1. Malware
                        1. Malicious Software
                          1. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                          2. Virus
                            1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
                            2. Worm
                              1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                          Show full summary Hide full summary

                          Similar

                          CyberSecurity
                          Stephen Williamson
                          CSS exam
                          Andy Oung
                          cyber security
                          Samuel Melendez
                          Certified Information Systems Security Professional (CISSP)
                          GoAsk Chaz
                          Artificial Intellegence
                          nicky elin
                          Pears of Wisdom - Security Concepts
                          Alex Poiry
                          CSS exam_1
                          Andy Oung
                          Phishing Mindmap Salvy
                          Salvy Ganpatsingh
                          cyber security
                          Jacqui Breeds
                          History- Medicine through time key figures
                          gemma.bell
                          AN ECONOMIC OVERVIEW OF IRELAND AND THE WORLD 2015/16
                          John O'Driscoll