Cyber Security

Description

Mind Map on Cyber Security, created by Jake STANFORD on 11/06/2020.
Jake STANFORD
Mind Map by Jake STANFORD, updated more than 1 year ago
Jake STANFORD
Created by Jake STANFORD about 4 years ago
5
0

Resource summary

Cyber Security
  1. Key Terms
    1. Threats
      1. external
        1. Caused outside of the organisation
        2. internal
          1. Caused by an incident inside of an organisation
          2. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
          3. Attack
            1. An attack is a deliberate action, targeting an organisation’s digital system or data.
            2. Unauthorised Access
              1. This refers to someone gaining entry without permission to an organisation’s system, software or data. This achieved by exploiting a security vulnerability
              2. Cyber Security
                1. Refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
                2. Trojan Horse
                  1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                  2. Rootkit
                    1. Designed to remotely access and control a computer system without being detected by security software or the user.
                    2. Keyloggers
                      1. spyware that records every keystroke made on a computer to steal personal information
                      2. Spyware
                        1. Is secretly installed to collect information from someone else's computer
                        2. DDoS attack
                          1. flooding a website with useless traffic to inundate and overwhelm the network
                          2. Ransomware
                            1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                            2. Adware
                              1. Automatically shows adverts such as popups.
                              2. Botnet
                                1. Bots take control of a computer system, without the user’s knowledge.
                                2. Pharming
                                  1. is when a victim redirects the user from a genuine website to a fake one.
                                  2. Shoulder Surfing/Shouldering
                                    1. It involves the attacker watching the victim while they provide sensitive information
                                    2. Baiting
                                      1. Cyber criminals make a promise of goods to get the information that they need.
                                      2. Blagging/Pretexting
                                        1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                        2. Phishing
                                          1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
                                          2. Tailgating/Piggybacking
                                            1. Trying to gain access to a secure room or building.
                                            2. Social Engineering
                                              1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes
                                              2. Quid Pro Quo
                                                1. Cyber criminals make a promise of a service to get the information that they need.
                                              3. Hackers
                                                1. Black hat hackers
                                                  1. Grey hat hackers
                                                    1. White hat hackers
                                                      1. Someone who seeks out and exploits these vulnerabilities.
                                                      Show full summary Hide full summary

                                                      Similar

                                                      CyberSecurity
                                                      Stephen Williamson
                                                      CSS exam
                                                      Andy Oung
                                                      cyber security
                                                      Samuel Melendez
                                                      Certified Information Systems Security Professional (CISSP)
                                                      GoAsk Chaz
                                                      Artificial Intellegence
                                                      nicky elin
                                                      Pears of Wisdom - Security Concepts
                                                      Alex Poiry
                                                      CSS exam_1
                                                      Andy Oung
                                                      Phishing Mindmap Salvy
                                                      Salvy Ganpatsingh
                                                      cyber security
                                                      Jacqui Breeds
                                                      Creative Writing
                                                      amberbob27
                                                      LINEA DEL TIEMPO DE LA EVOLUCION DEL MICROSCOPIO
                                                      valentina brizio