Cyber security

Description

Cyber security CS Year 8
Ruby Martin
Mind Map by Ruby Martin, updated more than 1 year ago
Ruby Martin
Created by Ruby Martin over 3 years ago
26
1

Resource summary

Cyber security
  1. Cyber attacks
    1. Hacking
      1. unauthorised access to computer material
      2. Phishing
        1. sending a fake email or message pretending to be from a bank or organisation, which tricks users into trying to log on to a fake website, stealing the login details
        2. Malware
          1. Malicious software, designed to cause harm
          2. Ransomware
            1. malware that encrypts users files and demands a ransom to decrypt them
            2. Botnet
              1. a network of computers which contain malware allowing them to be controlled by a hacker
              2. Keylogger
                1. malware that records every keypress and sends it to a hacker for analysis
              3. Cyber defences
                1. Security software
                  1. often called antivirus software even though it deals with more than just viruses, scans computers for known malware and removes it. Must be kept up to date with the latest malware definitions
                  2. White-hat hacking
                    1. hacking that is done with the authorisation of the company being hacked. The hacker produces a report of all the vulnerabilities they found, so that the company can fix them
                    2. Grey-hat hacking
                      1. hacking done without the authorisation of the company, but with good intentions, often the company will be informed of how the hacker was able to gain access
                      2. Backups
                        1. keeping a copy of important data on a different system, so that it can be restored if the original is damaged
                      3. Encryption
                        1. Cipher
                          1. a method of encrypting text
                          2. Plain text
                            1. the unencrypted data
                            2. Ciphertext
                              1. the encrypted data
                              2. Key
                                1. some information needed to encrypt/decrypt the data
                                2. Crack
                                  1. to read encrypted data without being given the key beforehand
                                  2. Brute force
                                    1. crack a cipher by trying every possible key until successful
                                    2. Statistical attack
                                      1. crack a cipher by using statistics and estimates of the most likely values
                                      2. Caeser cipher
                                        1. a simple cipher, where each letter is shifted a number of places up the alphabet
                                        2. Substitution cipher
                                          1. a simple cipher where each letter is replaced by a different letter
                                        Show full summary Hide full summary

                                        Similar

                                        CyberSecurity
                                        Stephen Williamson
                                        CSS exam
                                        Andy Oung
                                        cyber security
                                        Samuel Melendez
                                        Certified Information Systems Security Professional (CISSP)
                                        GoAsk Chaz
                                        Artificial Intellegence
                                        nicky elin
                                        Pears of Wisdom - Security Concepts
                                        Alex Poiry
                                        CSS exam_1
                                        Andy Oung
                                        Phishing Mindmap Salvy
                                        Salvy Ganpatsingh
                                        cyber security
                                        Jacqui Breeds
                                        Ratios Quiz
                                        rory.examtime
                                        The Endocrine System
                                        DrABC