System Threats

Descrição

6 Cyber threats
Jasmine Farmand
Mapa Mental por Jasmine Farmand, atualizado more than 1 year ago
Jasmine Farmand
Criado por Jasmine Farmand mais de 7 anos atrás
9
0

Resumo de Recurso

System Threats
  1. Malware
    1. It's used for many different reasons which include:
      1. Disrupting computer systems
        1. Gaining sensitive info
          1. Gaining access to private systems
            1. Displaying unwanted adverts
              1. Methods
                1. Viruses
                  1. Worms
                    1. Scareware
                      1. Trojan horses
                        1. Spybots
                        2. Prevention
                          1. Installing anti-virus software
                            1. Always updating systems whenever possible
                              1. Think before clicking
                                1. Always backing up files
                              2. Malicious software is used to gain access to and damage computers without consent
                                1. Effects
                                  1. Computer crashing or slowing down
                                    1. Files may be deleted, stolen, corrupted, encrypted or changed
                                      1. They may record your keystrokes to gain passwords, bank info, usernames etc
                                    2. Phishing
                                      1. How is it done?
                                        1. Usually an email or message will be sent to the victim
                                          1. It will either ask for money or link you to a fake website that looks real
                                            1. The victim then enters their info on this website into the hands of the online criminals
                                          2. What is gained?
                                            1. Bank details
                                              1. Usernames
                                                1. Passwords
                                              2. Preventions
                                                1. Learn the signs that an email or website is fishy
                                                  1. Promote gifts, similar business logos, real name of employees, spelling mistakes in the email etc.
                                                  2. Safe websites begin with https:// and have a closed lock icon so only enter info on these sites
                                                    1. Strong protection
                                                      1. Disable pop-ups
                                                    2. What is it?
                                                      1. Phishing is the attempt to gain sensitive information from peoplethrough email/instant messenger
                                                    3. Brute force attack
                                                      1. What is it?
                                                        1. It's when an attacker tries many passwords in the hope of guessing correctly with one
                                                        2. How does it work?
                                                          1. It works by calculating every possible combination that could make up a passwords length
                                                          2. Prevention
                                                            1. Longer passwords can take decades to crack whereas short passwords can be discovered quickly
                                                              1. So create a long password with a mix of characters and numbers
                                                              2. Don't use dictionary words or slightly modified words as it is easy to guess
                                                                1. Locking accounts after failed guess attempts but this has its own problems
                                                                  1. Captcha
                                                                  2. What do they gain?
                                                                    1. Theft of data
                                                                      1. Access to private systems
                                                                    2. Denial of service attack
                                                                      1. What is it?
                                                                        1. It's an attack launched on a network or website
                                                                          1. DOS attacks are different, some can be relatively harmeless whilst others are infected with trojans
                                                                          2. How?
                                                                            1. Cyber criminals flood the target with useless requests or log in requests
                                                                              1. This grinds the system to a halt
                                                                              2. Malware can be used to control many computers to launch this attack ('zombies') which all send requests at the same time
                                                                              3. Why and what is gained?
                                                                                1. Extortion - Attackers can demand money to stop the attack (although success rate is low)
                                                                                  1. Sometimes people who DOS are hired to launch an attack on a rival company
                                                                                    1. To show their disapproval to a game, or the government, for example
                                                                                      1. To distract a network/company to perform other attacks
                                                                                        1. Results in a the compan/network losing reputation, time and money
                                                                                        2. Prevention
                                                                                          1. There isn't really a way to prevent an attack but making a plan if it happens,
                                                                                            1. constantly patching up vulnerabilities,
                                                                                              1. and having a strong firewall are ways to minimise damage
                                                                                            2. Packet filters on roters
                                                                                          2. SQL Injection
                                                                                            1. What is it?
                                                                                              1. SQL's a programming language and a hacker uses it to target a database or website form
                                                                                              2. How?
                                                                                                1. When the form asks for input, an SQL statement is entered which runs and allows the user...
                                                                                                  1. ...to control or change data in the database
                                                                                                2. Prevention
                                                                                                  1. Lock down database servers and remove backdoors
                                                                                                    1. Change default admin passwords
                                                                                                      1. Prevention testing
                                                                                                      2. Effects
                                                                                                        1. Revealing data that's hidden
                                                                                                          1. Data is controlled,stolen or changed
                                                                                                        2. Data interception
                                                                                                          1. What is it?
                                                                                                            1. When a hacker intercepts data packets when they are being sent without the user knowing
                                                                                                            2. How?
                                                                                                              1. A hacker uses data packet analysers to intercept data packets when they are sent from a computer
                                                                                                              2. Why, what do they gain?
                                                                                                                1. Hackers gain things such as logins,passwords,credit cand numbers and PIN's
                                                                                                                2. Prevention
                                                                                                                  1. Using data encrypting techniques so the hacker will get useless info

                                                                                                                Semelhante

                                                                                                                A level Computing Quiz
                                                                                                                Zacchaeus Snape
                                                                                                                Types and Components of Computer Systems
                                                                                                                Jess Peason
                                                                                                                Input Devices
                                                                                                                Jess Peason
                                                                                                                Output Devices
                                                                                                                Jess Peason
                                                                                                                Computing
                                                                                                                Kwame Oteng-Adusei
                                                                                                                Pack of playing cards answer
                                                                                                                Karl Taylor
                                                                                                                Code Challenge Flow Chart
                                                                                                                Charlotte Hilton
                                                                                                                OCR gcse computer science
                                                                                                                Jodie Awthinre
                                                                                                                The Norman Conquest 1066-1087
                                                                                                                adam.melling
                                                                                                                Computing Hardware - CPU and Memory
                                                                                                                ollietablet123
                                                                                                                Physics Review!
                                                                                                                Nicholas Weiss