null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
23518058
cyber security
Descrição
Mapa Mental sobre cyber security, criado por Jonathan FREEMAN em 08-06-2020.
Sem etiquetas
key stage 3
Mapa Mental por
Jonathan FREEMAN
, atualizado more than 1 year ago
Mais
Menos
Criado por
Jonathan FREEMAN
mais de 4 anos atrás
7
0
2
Resumo de Recurso
cyber security
key terms
unauthorised access
refers to someone gaining entry without permision to a system
attack
a delibarate action targeting an organisations digital systems
threat
internal
incident inside an organisation
external
caused outside the organisation
an action that is delibarate
cyber security
refers to range of measures that can be taken to protect computer systems networks and data from unauthorised access or cyber attack
hackers
someone who seeks out and exploits these vulnerabilities.
Black hat hacker
someone who tries to inflict damage by compramising security systems
grey hat hacker
someone who does it for fun and not with malicious intent
white hat hacker
someone who works with organisation to strengthen the security systems
types of threats
malicious software
this an umbrella term given to a software that is designed to harm digital systems
virus
a piece of malicious code that attaches to a legitimate programme
worm
worms get around by exploiting vulnerbilities is digital systems
malware
trojan horse
users are tricked to download it onto their computers once installed it does the permitted task
Rootkit
designed to acceess and control a computer system without being detected
ransomware
encrypts files stored on a computer to steal money
spyware
secretly installed to collect information
key loggers
spyware that records every keystroke to steal information
adware
autimaticy shows adverts and popups
bot net
bots take control of the system without the user noticing
DDoS
social engineering
shoulder surfing
watching the victim over their shoulder while they put in information
phising
the victim recieves an email that looks serious but is a scam
pharming
the victim gets redirected from one website to a fake one
blagging
the attacker gives the victim a scenario so they give them money
tailgating
trying to gain access to secure a room or building
quid pro quo
cyber criminals make a promise and then they get what they need
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
CyberSecurity
Stephen Williamson
CSS exam
Andy Oung
cyber security
Samuel Melendez
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
Artificial Intellegence
nicky elin
Pears of Wisdom - Security Concepts
Alex Poiry
CSS exam_1
Andy Oung
Phishing Mindmap Salvy
Salvy Ganpatsingh
cyber security
Jacqui Breeds
Literatura
neusamiotto
Previdência X Seguridade
André Cavallini
Explore a Biblioteca