learning aim b: cyber security

Descripción

Mapa Mental sobre learning aim b: cyber security, creado por Keane MEEK el 01/05/2020.
Keane MEEK
Mapa Mental por Keane MEEK, actualizado hace más de 1 año
Keane MEEK
Creado por Keane MEEK hace alrededor de 4 años
6
0

Resumen del Recurso

learning aim b: cyber security
  1. key terms
    1. threat
    2. why systems are attacked
      1. malware
        1. trojan horse

          Nota:

          • users are tricked into downloading it. 
          1. rootkit

            Nota:

            • is a set of tools that give a hacker high level administrative control of a computer.
            1. ransomware

              Nota:

              • encrypted files stored on a computer to exort or steal money from organisations.
              1. spyware

                Nota:

                • malicious software secretly installed to collect information from someone elses computer.
                1. keyloggers

                  Nota:

                  • spyware that records every keystroke made on a computer to steal personal information.
          2. botnet

            Nota:

            • is an army of zombie devices used to carry out mass attacks and send spam to millions of users.
            1. DDOS

              Nota:

              • flooding a website with useless traffic to inundate and overwhelm the network.
          3. social engineering

            Nota:

            • involves tricking people into divulging valuable information about themselves.
            1. phishing

              Nota:

              • a way of attempting to acquire information by pretending to be from a trustworthy source.
              1. spear phishing

                Nota:

                • involves bespoke emails being sent to well searched victims.
                1. blagging

                  Nota:

                  • a blagger invents a scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information
                  1. shoulder surfing

                    Nota:

                    • acquiring sensitive information by someone peering over a users shoulder when they are using a device.
                    1. pharming

                      Nota:

                      • involves redirecting people to bogus look a like websites without realising it has happened. 
                      1. man in the middle attack

                        Nota:

                        • a form of eavesdropping where the attacker makes a independent connection between two victims and steals information to use fraudulently. 
            Mostrar resumen completo Ocultar resumen completo

            Similar

            Universidades de Latinoamérica
            Diego Santos
            Vocabulario unidad 13
            Laura Maestro
            TEOREMA de PITÁGORAS - Del Mapa Mental
            JL Cadenas
            Preguntas previas a introducir la tecnología en el aula
            Diego Santos
            Ingles III, Present Perfect
            serseg83
            FLUJOGRAMA
            Elizabeth Alvare
            SEIS ESTRATEGIAS PARA MEJORAR LA COMPRENSIÓN LECTORA
            lupitta_12
            Vocabulario y personajes destacados en la España del siglo XIX
            Juan Fernando de la Iglesia
            Mapa mental inteligencia emocional
            Alexandra A
            =ARTE=...
            JL Cadenas
            MAPA CONCEPTUAL DE NETIQUETA
            Hayler Narvaez