1.6 System Security

Descrição

Mapa Mental sobre 1.6 System Security, criado por Casey Morris em 21-03-2018.
Casey Morris
Mapa Mental por Casey Morris, atualizado more than 1 year ago
Casey Morris
Criado por Casey Morris mais de 6 anos atrás
72
0

Resumo de Recurso

1.6 System Security
  1. Forms of Attack
    1. Malware
      1. Brute Force
        1. Trial and error is a brute force attempt to access a computer system.
        2. Phising
          1. Denial Of Service
            1. It is a type of attack when multiple compromised systems which are often infected with trojan and uses it to target a single system.
            2. SQL injection
              1. Data interception and theft
                1. Data interception and theft is a hacker has stole data from a computer. They can do this by tapping a connection, intercepting wireless traffic, or plugging into a network and monitoring traffic.
              2. Phising is usually disguised as a used popular website or spammed messages so you provide your email address and other personal details. It pretends to be trustworthy.
                1. Encryption
                  1. where data is translated into code so that only authorised users, or users with the key can decrypt it.
                2. What is system security and cyber attacks?
                  1. A cyber attack is an attempt to gain unauthorised access to or control of a computer and the network which it is connected to
                    1. Security is a set of measures taken to protect a computer from harm to the data and software.
                    2. Reasons for Network security
                      1. Confidental data
                        1. Data Theft
                          1. Data Loss
                            1. Data Changes
                              1. Legal obligations
                              2. Worms are a network threat as they are hard to get rid of as they copy themselves over networks to external storage and other computers
                                1. Spyware collects your information and sends it to somebody.
                                  1. A keylogger can be either hardware or software. It is designed to record every key that is pressed on a keyboard, therefore giving access to all the data that is entered into a computer such as usernames, passwords or websites visited.
                                    1. A trojan is a program which is designed to deliberately trick a user in to downloading and installing malicious software.
                                      1. Identifying and preventing vulnerabilities
                                        1. Passwords
                                          1. Encryption
                                            1. Firewalls
                                              1. Network policies
                                                1. Network forensics
                                                  1. Penetration testing
                                                    1. User access levels
                                                    2. Social Engineering
                                                      1. Relies on human interaction
                                                        1. Commonly involves tricking users into breaking normal security procedures
                                                        2. Malware
                                                          1. It is malicious software that causes identify theft, financial loss and permanent file deletion.
                                                          2. Virus
                                                            1. A virus harms your computer in some way. It usually deletes or begins altering files and stops programs from running.
                                                              1. Around 82,00 viruses are made each day
                                                                1. Can affect all components of an operating system
                                                              2. DDOS
                                                                1. Overloads a website with unwanted traffic
                                                                2. The effects of a successful attack
                                                                  1. Execute queries, exposing data
                                                                    1. Delete data
                                                                      1. Altering data, resulting in data integrity issues
                                                                        1. Bypass authentication procedures and impersonate specific user
                                                                        2. Anti malware software
                                                                          1. Software with the aim of preventing malware from entering the system.
                                                                          2. Firewalls
                                                                            1. Software that performs a 'barrier' between a potential attack and the computer system
                                                                              1. Monitor application and network usage
                                                                                1. Can be held on a server, or a standalone computer
                                                                                2. Network Policies
                                                                                  1. Defines how a system can be secured through specific rules or requirements.
                                                                                    1. Explains how particular a user should access and treat a system
                                                                                    2. User Access Levels
                                                                                      1. also known as system access rights
                                                                                        1. allows a system administrator to set up a hierarchy of users.
                                                                                          1. Lower level users would have access to limited information and settings.
                                                                                            1. Higher level users can access the most sensitive data on the system
                                                                                            2. Biometric security
                                                                                              1. Can be used in addition to 'standard' password entry
                                                                                                1. Examples - retina scan, fingerprint, voice and facial recognition.
                                                                                                2. SQL injection
                                                                                                  1. attacks could access systems containing customer data, intellectual property and other sensitive information
                                                                                                    1. Malicious code to be user in an SQL query when it is run in order for the injection attack to take place.
                                                                                                    2. Network Forensics
                                                                                                      1. A branch of digital forensics
                                                                                                        1. Covers the forensic investigation of networks and their devices attached to them
                                                                                                          1. primarily involves the examination of data sent across a network
                                                                                                            1. May involve the user of various forensic techniques including 'packet sniffing'
                                                                                                              1. Packet sniffing involves the interception of packets across the network
                                                                                                                1. Packet sniffing tools can help users understand what is being sent around the network at the time.
                                                                                                            2. Penetration Testing
                                                                                                              1. Tests performed under a controlled environment by a qualified person
                                                                                                                1. Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they cannot be maliciously exploited.

                                                                                                                Semelhante

                                                                                                                verbos irregulares
                                                                                                                santosfilipe123
                                                                                                                Português - 3 - Ortografia e acentuação
                                                                                                                glenerdourado
                                                                                                                INQUÉRITO POLICIAL
                                                                                                                julianodanielp
                                                                                                                Inglês - vocabulário
                                                                                                                nando.mrossi
                                                                                                                RESUMOS EXAME GEOGRAFIA A
                                                                                                                beatriizcunha
                                                                                                                Dicas de Português para Concursos
                                                                                                                Rodrigo Pizetta
                                                                                                                Glossário de Biologia
                                                                                                                GoConqr suporte .
                                                                                                                Atualidades
                                                                                                                GoConqr suporte .
                                                                                                                Pronomes ( Revisão)
                                                                                                                Rodrigo de Freit9506
                                                                                                                Hipertensão Arterial Sistêmica - HAS
                                                                                                                Katye dos Passos Rodrigues