System Threats

Descrição

Basics on all six system threats
Lana-Mae Garrett
Mapa Mental por Lana-Mae Garrett, atualizado more than 1 year ago
Lana-Mae Garrett
Criado por Lana-Mae Garrett mais de 7 anos atrás
14
0

Resumo de Recurso

System Threats
  1. Malware
    1. Definition
      1. Effects
        1. Prevention
          1. To prevent malware you can ensure you have strong security software, make sure it is updated to the latest version and back up your files regularly, companies should also make sure to train staff to be cautious of attachments
          2. It may crash, reboot, slow down, slow your internet connection, files may be deleted or corrupted and in some cases can record the keys pressed on your keyboard which would allow the designer to access your information
          3. Malicious Software that is designed to infect a computer and commit crimes like identity fraud
        2. Phishing
          1. Definiton
            1. Disguising as a trusted entity like an email in order to gain personal information- software identity fraud
            2. Effects
              1. Money can be taken out or spent, new accounts can be opened, access to data is gained and companies may be blacklisted which can damage reputation
              2. Prevention
                1. Strong security software, disable pop ups,be cautious of fake websites and emails and to never disclose personal or financial information
              3. Brute Force Attack
                1. Effects
                  1. An exhaustive rather than intellectual trial and error in order to decode encrypted data
                  2. Prevention
                    1. Definition

                    Semelhante

                    A level Computing Quiz
                    Zacchaeus Snape
                    Types and Components of Computer Systems
                    Jess Peason
                    Input Devices
                    Jess Peason
                    Output Devices
                    Jess Peason
                    Software Processes
                    Nurul Aiman Abdu
                    Computing
                    Kwame Oteng-Adusei
                    Software testing strategies: Summary
                    harrymt
                    Software Application
                    Dim Ah
                    Pack of playing cards answer
                    Karl Taylor
                    Code Challenge Flow Chart
                    Charlotte Hilton