cyber security

Beschreibung

Mindmap am cyber security, erstellt von ryan brannigan am 11/06/2020.
ryan  brannigan
Mindmap von ryan brannigan , aktualisiert more than 1 year ago
ryan  brannigan
Erstellt von ryan brannigan vor fast 4 Jahre
13
0

Zusammenfassung der Ressource

cyber security
  1. key terms
    1. un atorised entery
      1. un wanted access to your computer
      2. attack
        1. internet
          1. external
            1. caused out side of the orginisation
            2. incident
            3. cyber security
            4. hackers
              1. some one that gets into a compuer
                1. a person or thing that hacks technoligy
                2. types of threates
                    1. malware
                      1. pecifically designed to disrupt, damage, or gain unauthorized access to a computer system.
                        1. Trojan Horse:
                          1. Rootkit
                            1. Ransomware:
                              1. Encrypts files stored on a computer to extort/demand or steal money from organisations.
                              2. spyware
                                1. Is secretly installed to collect information from someone else's computer
                                2. keyloggers
                                  1. spyware that records every keystroke made on a computer to steal personal information
                              3. social enjenering
                                1. Shoulder Surfing/Shouldering
                                  1. It involves the attacker watching the victim while they provide sensitive information
                                  2. Phishing
                                    1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                                    2. Pharming
                                      1. s when a victim redirects the user from a genuine website to a fake one.
                                      2. Blagging/Pretexting
                                        1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
                                        2. Tailgating/Piggybacking
                                          1. Trying to gain access to a secure room or building.
                                          2. Baiting
                                            1. Cyber criminals make a promise of goods to get the information that they need.
                                          Zusammenfassung anzeigen Zusammenfassung ausblenden

                                          ähnlicher Inhalt

                                          CyberSecurity
                                          Stephen Williamson
                                          CSS exam
                                          Andy Oung
                                          cyber security
                                          Samuel Melendez
                                          Certified Information Systems Security Professional (CISSP)
                                          GoAsk Chaz
                                          Artificial Intellegence
                                          nicky elin
                                          Pears of Wisdom - Security Concepts
                                          Alex Poiry
                                          CSS exam_1
                                          Andy Oung
                                          Phishing Mindmap Salvy
                                          Salvy Ganpatsingh
                                          cyber security
                                          Jacqui Breeds
                                          Evolution des Menschen (bioloos)
                                          sonja.loos
                                          IKA-Theoriefragen Serie 20 (15 Fragen)
                                          IKA ON ICT GmbH