Computers Security

Beschreibung

Security, threats, and Attacks).
juangbautista
Mindmap von juangbautista, aktualisiert more than 1 year ago
juangbautista
Erstellt von juangbautista vor etwa 11 Jahre
29
0

Zusammenfassung der Ressource

Computers Security
  1. Definition: Is the protection of computing systems and the data that they store or access.
    1. A Malware is any software specifically designed to damage a computer system without owner knowledge. Examples: worms, viruses, & Trojan horses.
      1. Trojan Horse: Is a program that is packaged usually with free applications such which carries a destructive virus, that creates problems in the computer system without our knowledge.
        1. Virus: Is a program stored on a computer disk, hard drive, or CD, that can cause unexpected effects such as destroying or corrupting data.
          1. Worm: Is a malicious software that copies itself repeatedly into a computers memory RAM
    2. Computers Security Villains: hacker, cracker, hacktivists, Cyberterrorism, and Cyber Fraud.
      1. Hackers: Are people who gain unauthorized access to computers or networks.
        1. Crackers: Are hackers who break into computers and networks for corrupt purposes. Also they can do major damage.
          1. Hacktivists: Are people with a politically or socially motivated purpose who break into a computer system.
            1. Cyberterrorism: Is a political attack against information, particularly via the Internet, to cause physical, real-world harm or disruption.
              1. Cyber Fraud: Is a type of social engineering attack where the victim is led to believe to give a fraudster a sum of money.
      2. Security
        1. Antivirus: Scans storage devices such as hard drives, or main memory to try to find viruses, quarantine them and destroy them.
          1. Firewall: A system that protects the computer from a intruders.
            1. Encryption: Turning readable data into unreadable data in order to prevent access that is not authorized. This is often used in the military.
              1. Password: Is a form of authentication used to guard or control a resource. It is usually used to protect electronic data.
                1. Biometrics: It is used to identify and compare some specific people’s characteristics such as voice, fingerprints, hand geometry, eye or facial characteristics.
        2. Juan Guillermo Bautista 10A
          Zusammenfassung anzeigen Zusammenfassung ausblenden

          ähnlicher Inhalt