Computers Security

Description

Security, threats, and Attacks).
juangbautista
Mind Map by juangbautista, updated more than 1 year ago
juangbautista
Created by juangbautista over 10 years ago
27
0

Resource summary

Computers Security
  1. Definition: Is the protection of computing systems and the data that they store or access.
    1. A Malware is any software specifically designed to damage a computer system without owner knowledge. Examples: worms, viruses, & Trojan horses.
      1. Trojan Horse: Is a program that is packaged usually with free applications such which carries a destructive virus, that creates problems in the computer system without our knowledge.
        1. Virus: Is a program stored on a computer disk, hard drive, or CD, that can cause unexpected effects such as destroying or corrupting data.
          1. Worm: Is a malicious software that copies itself repeatedly into a computers memory RAM
    2. Computers Security Villains: hacker, cracker, hacktivists, Cyberterrorism, and Cyber Fraud.
      1. Hackers: Are people who gain unauthorized access to computers or networks.
        1. Crackers: Are hackers who break into computers and networks for corrupt purposes. Also they can do major damage.
          1. Hacktivists: Are people with a politically or socially motivated purpose who break into a computer system.
            1. Cyberterrorism: Is a political attack against information, particularly via the Internet, to cause physical, real-world harm or disruption.
              1. Cyber Fraud: Is a type of social engineering attack where the victim is led to believe to give a fraudster a sum of money.
      2. Security
        1. Antivirus: Scans storage devices such as hard drives, or main memory to try to find viruses, quarantine them and destroy them.
          1. Firewall: A system that protects the computer from a intruders.
            1. Encryption: Turning readable data into unreadable data in order to prevent access that is not authorized. This is often used in the military.
              1. Password: Is a form of authentication used to guard or control a resource. It is usually used to protect electronic data.
                1. Biometrics: It is used to identify and compare some specific people’s characteristics such as voice, fingerprints, hand geometry, eye or facial characteristics.
        2. Juan Guillermo Bautista 10A
          Show full summary Hide full summary

          Similar

          BIOLOGY B1 3
          x_clairey_x
          CHEMISTRY C1 4
          x_clairey_x
          Of Mice and Men
          amyk4321
          TYPES OF DATA
          Elliot O'Leary
          GCSE AQA Chemistry - Unit 3
          James Jolliffe
          Structure of the League of Nations
          saskiamitchell.19
          Biology B2.2
          Jade Allatt
          Bay of Pigs Invasion : April 1961
          Alina A
          MAPA MENTAL DISEÑO GRAFICO
          puntoideascali
          1PR101 2.test - Část 6.
          Nikola Truong
          GENERAL PRACTICE-1
          Luis Felipe Chávez Choque