null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
13333674
Unit 1.6 V2 System Security
Description
My Unit 1.6 GCSE Computing Mind map
No tags specified
gcsecomputing
unit1.6
computing
year 10
Mind Map by
Mathew Wheatley
, updated more than 1 year ago
More
Less
Created by
Mathew Wheatley
about 6 years ago
72
2
0
Resource summary
Unit 1.6 V2 System Security
Types of attack
Malware - MALicious softWARE
Files deleted, corrupted or encrypted
Can cause identity theft
Trojan Horses, Viruses and/or worms
Phishing - Disguising as a normal webpage
Peoples private accounts are accessed.
Brands lose high value data and therefore reputation
Brute Force Attack - Trial and Error Method
Access to Corporate Systems
Theft of Personal Data; passwords and your PIN
DDOS - Direct Denial Of Service, zombie computers flood a system causing it to crash
Loss of access for customers
Loss of revenue and reputation of the company
Data Interception - Packet Sniffing to extract data throughout its 'journey'
Usernames and passwords can be compromised
Loss of corporate data is possible
SQL Injections - Can change data in a database by inserting extra code into a text input box
Private data in file can be released / altered
Rogue records can be added
Preventing Vulnerabilities
Penetration Testing - Checks for potential vulnerabilities by a qualified person in a controlled environment
Network Forensics - Thorough Forensic Investigation of networks and their devices
Anti Malware - Prevents Malware
Anti Virus - Specifically targets computer viruses
Network Policies - Defines how a system can be secured through specific rules
Firewall - Software that performs a 'barrier'. 99.9% effective. Detects patterns
User Access Levels - Who can view what. Administrator makes a hierarchy
Passwords - Allow a time gap and limit number of attempts
Encryption - See Unit 1.5
Biometric Security
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
2.1.3 Software
Jake Youd
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Computing Hardware - CPU and Memory
ollietablet123
Browse Library