learning aim b: cyber security

Description

Mind Map on learning aim b: cyber security, created by Keane MEEK on 01/05/2020.
Keane MEEK
Mind Map by Keane MEEK, updated more than 1 year ago
Keane MEEK
Created by Keane MEEK about 4 years ago
6
0

Resource summary

learning aim b: cyber security
  1. key terms
    1. threat
    2. why systems are attacked
      1. malware
        1. trojan horse

          Annotations:

          • users are tricked into downloading it. 
          1. rootkit

            Annotations:

            • is a set of tools that give a hacker high level administrative control of a computer.
            1. ransomware

              Annotations:

              • encrypted files stored on a computer to exort or steal money from organisations.
              1. spyware

                Annotations:

                • malicious software secretly installed to collect information from someone elses computer.
                1. keyloggers

                  Annotations:

                  • spyware that records every keystroke made on a computer to steal personal information.
          2. botnet

            Annotations:

            • is an army of zombie devices used to carry out mass attacks and send spam to millions of users.
            1. DDOS

              Annotations:

              • flooding a website with useless traffic to inundate and overwhelm the network.
          3. social engineering

            Annotations:

            • involves tricking people into divulging valuable information about themselves.
            1. phishing

              Annotations:

              • a way of attempting to acquire information by pretending to be from a trustworthy source.
              1. spear phishing

                Annotations:

                • involves bespoke emails being sent to well searched victims.
                1. blagging

                  Annotations:

                  • a blagger invents a scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
                  1. shoulder surfing

                    Annotations:

                    • acquiring sensitive information by someone peering over a users shoulder when they are using a device.
                    1. pharming

                      Annotations:

                      • involves redirecting people to bogus look a like websites without realising it has happened. 
                      1. man in the middle attack

                        Annotations:

                        • a form of eavesdropping where the attacker makes a independent connection between two victims and steals information to use fraudulently. 
            Show full summary Hide full summary

            Similar

            Periodic Table
            PatrickNoonan
            10 Mind Mapping Strategies for Teachers
            Andrea Leyden
            OCR AS Biology - Lipids
            Chris Osmundse
            PHYSICS P1 1
            x_clairey_x
            Biology AQA 3.2.5 Mitosis
            evie.daines
            A2 Organic Chemistry - Reactions
            yannycollins
            GCSE REVISION TIMETABLE
            haameem1999
            Introduction to the Atom
            Sarah Egan
            Navegacion
            Adriana Forero
            MICROSOFT WORD 2013 SKILLS FOR WORK
            John O'Driscoll
            GoConqr Guide to Flowcharts for Business
            Sarah Egan