null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
8874872
System Threats
Descrição
malware mindmap
Sem etiquetas
computing
software
malware
phishing
sql injection
brute force attack
computing
year 9
Mapa Mental por
Ella Fisher Scott
, atualizado more than 1 year ago
Mais
Menos
Criado por
Ella Fisher Scott
mais de 7 anos atrás
18
0
0
Resumo de Recurso
System Threats
Malware
Definition
Effects
Prevention
Computer protection programs, virus protecting software.
Crash your computer, slow your internet connection, many of your files might be deleted.
Malware—software written to infect computers and commit crimes such as fraud and identity theft.
Phising
Definiton
Effects
Prevention
Strong security software such as firewall.
Identity theft and confidential details being used as a different person, can prevent the original users account from being used
Getting peoples trust and then taking their passwords and other personal information
Brute Force Attack
Definition
Effects
Prevention
Locks out after number of tries at guessing password.
Theft of data and access to private programs.
Guessing a password until you get it right and hack into an account.
Denial of Service Attack
Definition
Effects
Prevention
Strong security software, configuration of the webserver.
Revenue losses, productivity loss, reputation damage, activity loss.
Flooding a server with traffic causes servers to overload, preventing their response to legitimate clients.
Data interception and Theft
Definition
Effects
Prevention
Strong encryption, virtual networks, network forensics.
Username of passwords stolen, theft of data.
Attacker monitors information and eventually gets information.
SQL injection
Definition
Effects
Prevention
Validation of input fields, using parameterised queries, rogue records can be added.
Revealing private data, data can be deleted.
Injection code into data and executed by data server.
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Software Processes
Nurul Aiman Abdu
Computing
Kwame Oteng-Adusei
BIOS
Tegan-Lianne Gardiner
Software testing strategies: Summary
harrymt
Software Application
Dim Ah
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
PLANEJAMENTO DE LÍNGUA PORTUGUESA 2018 - 2ª ETAPA
Adriana Marcia Couto Poletti
Explore a Biblioteca