null
US
Info
Ratings
Comments
Mind Map
by
Casey Morris
, created
more than 1 year ago
Mind Map on 1.6 System Security, created by Casey Morris on 21/03/2018.
Pinned to
74
0
0
No tags specified
gcse
Created by
Casey Morris
over 7 years ago
Rate this resource by clicking on the stars below:
(0)
Ratings (0)
0
0
0
0
0
0 comments
There are no comments, be the first and leave one below:
To join the discussion, please
sign up for a new account
or
log in with your existing account
.
Close
12936700
mind_map
2018-03-27T15:37:38Z
1.6 System
Security
Forms of
Attack
Malware
Brute
Force
Phising
Denial
Of
Service
SQL
injection
Data
interception
and theft
Phising is usually disguised as a used
popular website or spammed messages so
you provide your email address and other
personal details. It pretends to be trustworthy.
What is system
security and
cyber attacks?
A cyber attack is an attempt to
gain unauthorised access to or
control of a computer and the
network which it is connected to
Security is a set
of measures
taken to protect a
computer from
harm to the data
and software.
Reasons for Network
security
Confidental
data
Data
Theft
Data
Loss
Data
Changes
Legal
obligations
Worms are a network
threat as they are hard to
get rid of as they copy
themselves over networks
to external storage and
other computers
Spyware collects your
information and sends it to
somebody.
A virus harms your computer in some way. It
usually deletes or begins altering files and
stops programs from running.
It is a type of attack when multiple
compromised systems which are often
infected with trojan and uses it to target a
single system.
Trial and error is a brute force
attempt to access a computer
system.
A keylogger can be either hardware or software. It is designed to
record every key that is pressed on a keyboard, therefore giving
access to all the data that is entered into a computer such as
usernames, passwords or websites visited.
A trojan is a program which
is designed to deliberately
trick a user in to downloading
and installing malicious
software.
Data interception and theft is a hacker has stole data from a
computer. They can do this by tapping a connection, intercepting
wireless traffic, or plugging into a network and monitoring traffic.
Identifying and
preventing
vulnerabilities
Passwords
Encryption
Firewalls
Network
policies
Network forensics
Penetration testing
User access levels
Around 82,00 viruses are made each day
Can affect all components of an
operating system
Social Engineering
Relies on human interaction
Commonly involves tricking
users into breaking normal
security procedures
Malware
It is malicious software that
causes identify theft,
financial loss and
permanent file deletion.
Virus
DDOS
Overloads a website
with unwanted traffic
The effects of a successful
attack
Execute queries, exposing
data
Delete
data
Altering data, resulting
in data integrity issues
Bypass
authentication
procedures and
impersonate
specific user
Anti malware
software
Software with the aim of preventing
malware from entering the system.
Firewalls
Software that performs a
'barrier' between a
potential attack and the
computer system
Monitor application and
network usage
Can be held on a server, or a
standalone computer
Network Policies
Defines how a system can be
secured through specific rules or
requirements.
Explains how particular a user should access
and treat a system
User Access Levels
also known as system access rights
allows a system
administrator to set up a
hierarchy of users.
Lower level users would have
access to limited information and
settings.
Higher level users can access
the most sensitive data on the
system
Encryption
where data is translated into code
so that only authorised users, or
users with the key can decrypt it.
Biometric security
Can be used in
addition to 'standard'
password entry
Examples - retina scan,
fingerprint, voice and facial
recognition.
SQL
injection
attacks could access
systems containing
customer data, intellectual
property and other
sensitive information
Malicious code to be user in an SQL
query when it is run in order for the
injection attack to take place.
Network Forensics
A branch of digital
forensics
Covers the forensic
investigation of networks and
their devices attached to them
primarily involves the
examination of data
sent across a network
May involve the user of
various forensic techniques
including 'packet sniffing'
Packet sniffing involves the interception
of packets across the network
Packet sniffing tools
can help users
understand what is
being sent around the
network at the time.
Penetration Testing
Tests performed under a
controlled environment by a
qualified person
Checks for current vulnerabilities and explores
potential ones in order to expose weaknesses in
the system so they cannot be maliciously
exploited.
Double click this node
to edit the text
Click and drag this button
to create a new node
New
0
of
0
Go to link
Track All
Untrack All
12936700
mind_map
2018-03-27T15:37:38Z
You need to log in to complete this action!
Register for Free