Unit 1.6 V2 System Security

Descripción

My Unit 1.6 GCSE Computing Mind map
Mathew Wheatley
Mapa Mental por Mathew Wheatley, actualizado hace más de 1 año
Mathew Wheatley
Creado por Mathew Wheatley hace alrededor de 6 años
72
2

Resumen del Recurso

Unit 1.6 V2 System Security
  1. Types of attack
    1. Malware - MALicious softWARE
      1. Files deleted, corrupted or encrypted
        1. Can cause identity theft
          1. Trojan Horses, Viruses and/or worms
          2. Phishing - Disguising as a normal webpage
            1. Peoples private accounts are accessed.
              1. Brands lose high value data and therefore reputation
              2. Brute Force Attack - Trial and Error Method
                1. Access to Corporate Systems
                  1. Theft of Personal Data; passwords and your PIN
                  2. DDOS - Direct Denial Of Service, zombie computers flood a system causing it to crash
                    1. Loss of access for customers
                      1. Loss of revenue and reputation of the company
                      2. Data Interception - Packet Sniffing to extract data throughout its 'journey'
                        1. Usernames and passwords can be compromised
                          1. Loss of corporate data is possible
                          2. SQL Injections - Can change data in a database by inserting extra code into a text input box
                            1. Private data in file can be released / altered
                              1. Rogue records can be added
                            2. Preventing Vulnerabilities
                              1. Penetration Testing - Checks for potential vulnerabilities by a qualified person in a controlled environment
                                1. Network Forensics - Thorough Forensic Investigation of networks and their devices
                                  1. Anti Malware - Prevents Malware
                                    1. Anti Virus - Specifically targets computer viruses
                                    2. Network Policies - Defines how a system can be secured through specific rules
                                      1. Firewall - Software that performs a 'barrier'. 99.9% effective. Detects patterns
                                        1. User Access Levels - Who can view what. Administrator makes a hierarchy
                                          1. Passwords - Allow a time gap and limit number of attempts
                                            1. Encryption - See Unit 1.5
                                              1. Biometric Security
                                              Mostrar resumen completo Ocultar resumen completo

                                              Similar

                                              A level Computing Quiz
                                              Zacchaeus Snape
                                              Types and Components of Computer Systems
                                              Jess Peason
                                              Input Devices
                                              Jess Peason
                                              Output Devices
                                              Jess Peason
                                              Computing
                                              Kwame Oteng-Adusei
                                              Pack of playing cards answer
                                              Karl Taylor
                                              Code Challenge Flow Chart
                                              Charlotte Hilton
                                              2.1.3 Software
                                              Jake Youd
                                              Computer Systems
                                              lisawinkler10
                                              Computer science quiz
                                              Ryan Barton
                                              Computing Hardware - CPU and Memory
                                              ollietablet123