Computers Security

Description

Security, threats, and Attacks).
juangbautista
Mind Map by juangbautista, updated more than 1 year ago
juangbautista
Created by juangbautista over 10 years ago
27
0
1 2 3 4 5 (0)

Resource summary

Computers Security
  1. Definition: Is the protection of computing systems and the data that they store or access.
    1. A Malware is any software specifically designed to damage a computer system without owner knowledge. Examples: worms, viruses, & Trojan horses.
      1. Trojan Horse: Is a program that is packaged usually with free applications such which carries a destructive virus, that creates problems in the computer system without our knowledge.
        1. Virus: Is a program stored on a computer disk, hard drive, or CD, that can cause unexpected effects such as destroying or corrupting data.
          1. Worm: Is a malicious software that copies itself repeatedly into a computers memory RAM
    2. Computers Security Villains: hacker, cracker, hacktivists, Cyberterrorism, and Cyber Fraud.
      1. Hackers: Are people who gain unauthorized access to computers or networks.
        1. Crackers: Are hackers who break into computers and networks for corrupt purposes. Also they can do major damage.
          1. Hacktivists: Are people with a politically or socially motivated purpose who break into a computer system.
            1. Cyberterrorism: Is a political attack against information, particularly via the Internet, to cause physical, real-world harm or disruption.
              1. Cyber Fraud: Is a type of social engineering attack where the victim is led to believe to give a fraudster a sum of money.
      2. Security
        1. Antivirus: Scans storage devices such as hard drives, or main memory to try to find viruses, quarantine them and destroy them.
          1. Firewall: A system that protects the computer from a intruders.
            1. Encryption: Turning readable data into unreadable data in order to prevent access that is not authorized. This is often used in the military.
              1. Password: Is a form of authentication used to guard or control a resource. It is usually used to protect electronic data.
                1. Biometrics: It is used to identify and compare some specific people’s characteristics such as voice, fingerprints, hand geometry, eye or facial characteristics.
        2. Juan Guillermo Bautista 10A
          Show full summary Hide full summary

          0 comments

          There are no comments, be the first and leave one below:

          Similar

          KEE2
          harrym
          Physics - Energy, Power & Work
          dominique22
          Forces and their effects
          kate.siena
          Geography Coastal Zones Flashcards
          Zakiya Tabassum
          AQA Biology B1 Questions
          Bella Statham
          Mind Maps with GoConqr
          Manikandan Achan
          The Effects of Climate Change
          j. stu
          GRE Verbal Reasoning Vocabulary Flashcards 1
          Sarah Egan
          The Lymphatic System
          james liew
          MAPA MENTAL DISEÑO GRAFICO
          Lizbeth Domínguez