1.6 system security

Beschreibung

1.1 - 1.8 Mindmap am 1.6 system security, erstellt von liam oneill am 21/03/2018.
liam oneill
Mindmap von liam oneill, aktualisiert more than 1 year ago
liam oneill
Erstellt von liam oneill vor etwa 6 Jahre
53
0

Zusammenfassung der Ressource

1.6 system security
  1. forms of attack
    1. Malware
      1. includes viruses, worms and trojan horses
        1. worms
          1. replicate itself in order to spread across a network
            1. in order to do this it exploits vulnerabilities in a network
          2. torjan horse
            1. designed to access a computer by misleading the user of its intent
          3. malicious software is designed to cause damage to a network or computer system
            1. it attaches itself to files and programs on a computer system
          4. phishing
            1. designed to acquire sensitive information
              1. commonly sent through email
                1. telephone phishing
                  1. direct phone calls that pretend to be an official service
                2. brute force
                  1. trial and error
                    1. can be used for gaining access to password-based entry systems
                    2. consists of an attacker entering possible passwords and phrases until one is correct
                    3. data interception and theft
                      1. packets that travel over networks can be intercepted
                        1. if packets are encrypted a key will be needed
                        2. packets reassembled by using a signature
                        3. SQL detection
                          1. social engineering
                            1. relies on human interaction
                              1. involves tricking users into breaking normal security procedures
                              2. DDOS
                                1. overloading a website with unwanted traffic
                                  1. uses a number of computers over a network of infected machines which send requests to a website which would bring it offline
                                2. preventing attacks
                                  1. penetration testing
                                    1. tests conducted in a controlled envirmoent
                                    2. network forensics
                                      1. involves the examination of data sent across a network
                                        1. packet sniffing
                                          1. helps a user understand what is being sent across the network all the time
                                            1. packet sniffing without written permission is a breach of the law
                                      2. network policies
                                        1. outline rules for network access
                                          1. acceptable use policy (AUP)
                                          2. anti malware software
                                            1. aims to prevent malware from entering the system
                                            2. firewalls
                                              1. software that performs as a barrier
                                                1. not 100% effective
                                                  1. can be held on a server or a stand alone computer
                                              2. passwords
                                                1. encryption
                                                  1. data is translated into code
                                                    1. julius ceasr
                                                      1. the key tells how many places along the alphabet the real letter is
                                                    2. user access levels
                                                      1. allows a system administrator to set up a hierarchy of users
                                                        1. lower level users = limited access
                                                      2. threats posed to networks
                                                        1. poor network policy
                                                          1. can expose a network to many threats
                                                            1. most networks restrict users to what they can and cant do
                                                          Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                          ähnlicher Inhalt

                                                          Spanisch Einstufungstest Niveau B1.1
                                                          SprachschuleAktiv
                                                          Latein Grundwortschatz Vokabeln
                                                          anna.grillborzer0656
                                                          2C Entwicklungspsychologie
                                                          petra.drewitz
                                                          Deutsche Redewendungen und Umgangssprache / Quiz 02 / deutschlernerblog.de
                                                          deutschlernerblog.de
                                                          Vererbung
                                                          Greta Warnke
                                                          Ecologie politique - Vocabulaire
                                                          Gaelle Bourgeois
                                                          GPSY ALPS
                                                          Simon Wirsching
                                                          SL2
                                                          N H
                                                          Vetie Radiologie 2017
                                                          Péroline de Gail
                                                          Milchkunde 2019 - Vetie
                                                          Peter Christian Ponn
                                                          Vetie Geflügelkrankheiten 2013
                                                          Janneke Bosse