Cyber Security

Descrição

Mapa Mental sobre Cyber Security, criado por Madison GREENWOOD em 11-06-2020.
Madison GREENWOOD
Mapa Mental por Madison GREENWOOD, atualizado more than 1 year ago
Madison GREENWOOD
Criado por Madison GREENWOOD mais de 4 anos atrás
10
0

Resumo de Recurso

Cyber Security
  1. Key Terms
    1. Attack
      1. An attack is a deliberate action ,targeting an organisation's digital system or data
      2. Cyber security
        1. It refers to the range of measures that can be taken to protect computer systems
          1. Networks and data from unauthorised access or cyber attack
          2. Threat
            1. A threat is an incident or an action witch is deliberate or unintended that results in disruption down time or data lost
              1. Internal threat = caused by an incident inside an organisation
                1. External threat = caused outside the organisation
              2. Unauthorised access
                1. This refers to someone gaining entry without permission to an organisation's system,software of data
                  1. This achieved by exploiting a security vulnerability
                2. Trojan horse
                  1. Users are tricked into downloading it to their computer.Once installed the Trojan horse works under cover to carry out a out predetermined task
                  2. Rootkit
                    1. Designed to remotely access and control a computer system without being detected by security software or the user
                    2. ransomware
                      1. Encrypts files stored on a computer system without being detected by security software of the user
                      2. Spyware
                        1. Is secretly installed to collect information from someone else's computer
                        2. Key loggers
                          1. Spyware that records every Keystroke made on a computer to steal personal infomation
                          2. Adware
                            1. Automatically shows adverts such as pop ups
                              1. most adware is harmless but some contain spyware such as keyloggers
                            2. Botnet
                              1. Bots take control of a computer system,without the users knowledge.A botnet is a large collection of malware-infected devices(zombies)
                                1. An attacker(bot herder) chooses when to 'wake' the zombies to preform an attack
                              2. Distributed Denial -of-service attack (DDoS attack)
                                1. Flooding a website with useless traffic to inundate and overwhelm the network
                              3. Social engineering
                                1. It is a set of methods used by cyber criminals to deceive individuals into handling over information that they can use for fraudulent purposes
                                  1. Shoulder surfing/shouldering
                                    1. It involves the attacker watching the victim while they provide sensitive information
                                    2. Phishing
                                      1. Is an attack in witch the victim receives an email disguised to look as if it has come from a reputable data.The email usually provides a link to another website where the information can be imputted
                                      2. Pharming
                                        1. It is when a victim redirects the user from a genuine website to a fake website
                                          1. Some pharming sites are so expertly copied from the genuine website that is very difficult to identity therefore this is carried out without the user knowing about it

                                      Semelhante

                                      CyberSecurity
                                      Stephen Williamson
                                      CSS exam
                                      Andy Oung
                                      cyber security
                                      Samuel Melendez
                                      Certified Information Systems Security Professional (CISSP)
                                      GoAsk Chaz
                                      Artificial Intellegence
                                      nicky elin
                                      Pears of Wisdom - Security Concepts
                                      Alex Poiry
                                      CSS exam_1
                                      Andy Oung
                                      Phishing Mindmap Salvy
                                      Salvy Ganpatsingh
                                      cyber security
                                      Jacqui Breeds
                                      Fórmulas de física
                                      Alessandra S.
                                      Seguridade Social 3 - Organização e Princípios Constitucionais
                                      André Cavallini