Computers Security

Description

Security, threats, and Attacks).
juangbautista
Mind Map by juangbautista, updated more than 1 year ago
juangbautista
Created by juangbautista over 10 years ago
28
0
1 2 3 4 5 (0)

Resource summary

Computers Security
  1. Definition: Is the protection of computing systems and the data that they store or access.
    1. A Malware is any software specifically designed to damage a computer system without owner knowledge. Examples: worms, viruses, & Trojan horses.
      1. Trojan Horse: Is a program that is packaged usually with free applications such which carries a destructive virus, that creates problems in the computer system without our knowledge.
        1. Virus: Is a program stored on a computer disk, hard drive, or CD, that can cause unexpected effects such as destroying or corrupting data.
          1. Worm: Is a malicious software that copies itself repeatedly into a computers memory RAM
    2. Computers Security Villains: hacker, cracker, hacktivists, Cyberterrorism, and Cyber Fraud.
      1. Hackers: Are people who gain unauthorized access to computers or networks.
        1. Crackers: Are hackers who break into computers and networks for corrupt purposes. Also they can do major damage.
          1. Hacktivists: Are people with a politically or socially motivated purpose who break into a computer system.
            1. Cyberterrorism: Is a political attack against information, particularly via the Internet, to cause physical, real-world harm or disruption.
              1. Cyber Fraud: Is a type of social engineering attack where the victim is led to believe to give a fraudster a sum of money.
      2. Security
        1. Antivirus: Scans storage devices such as hard drives, or main memory to try to find viruses, quarantine them and destroy them.
          1. Firewall: A system that protects the computer from a intruders.
            1. Encryption: Turning readable data into unreadable data in order to prevent access that is not authorized. This is often used in the military.
              1. Password: Is a form of authentication used to guard or control a resource. It is usually used to protect electronic data.
                1. Biometrics: It is used to identify and compare some specific people’s characteristics such as voice, fingerprints, hand geometry, eye or facial characteristics.
        2. Juan Guillermo Bautista 10A
          Show full summary Hide full summary

          0 comments

          There are no comments, be the first and leave one below:

          Similar

          The Great Gatsby - Theme
          Heather Taylor
          Breaking Bad
          PatrickNoonan
          The Cold War
          dottydiva96
          Biology Revision - Y10 Mock
          Tom Mitchell
          Databases
          Dean Whittle
          French diet and health vocab
          caitlindavies8
          AQA Physics P1 Quiz
          Bella Statham
          Chemistry (C3)
          Amy Lashkari
          CHARACTERS IN OF MICE AND MEN
          jessicasusanevans
          New GCSE Maths required formulae
          Sarah Egan