null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
13333674
Unit 1.6 V2 System Security
Descrição
My Unit 1.6 GCSE Computing Mind map
Sem etiquetas
gcsecomputing
unit1.6
computing
year 10
Mapa Mental por
Mathew Wheatley
, atualizado more than 1 year ago
Mais
Menos
Criado por
Mathew Wheatley
mais de 6 anos atrás
74
2
0
Resumo de Recurso
Unit 1.6 V2 System Security
Types of attack
Malware - MALicious softWARE
Files deleted, corrupted or encrypted
Can cause identity theft
Trojan Horses, Viruses and/or worms
Phishing - Disguising as a normal webpage
Peoples private accounts are accessed.
Brands lose high value data and therefore reputation
Brute Force Attack - Trial and Error Method
Access to Corporate Systems
Theft of Personal Data; passwords and your PIN
DDOS - Direct Denial Of Service, zombie computers flood a system causing it to crash
Loss of access for customers
Loss of revenue and reputation of the company
Data Interception - Packet Sniffing to extract data throughout its 'journey'
Usernames and passwords can be compromised
Loss of corporate data is possible
SQL Injections - Can change data in a database by inserting extra code into a text input box
Private data in file can be released / altered
Rogue records can be added
Preventing Vulnerabilities
Penetration Testing - Checks for potential vulnerabilities by a qualified person in a controlled environment
Network Forensics - Thorough Forensic Investigation of networks and their devices
Anti Malware - Prevents Malware
Anti Virus - Specifically targets computer viruses
Network Policies - Defines how a system can be secured through specific rules
Firewall - Software that performs a 'barrier'. 99.9% effective. Detects patterns
User Access Levels - Who can view what. Administrator makes a hierarchy
Passwords - Allow a time gap and limit number of attempts
Encryption - See Unit 1.5
Biometric Security
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
2.1.3 Software
Jake Youd
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch
Explore a Biblioteca