null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
12933079
1.6 system security
Description
1.1 - 1.8 Mind Map on 1.6 system security, created by liam oneill on 21/03/2018.
No tags specified
1.1 - 1.8
Mind Map by
liam oneill
, updated more than 1 year ago
More
Less
Created by
liam oneill
about 6 years ago
53
0
0
Resource summary
1.6 system security
forms of attack
Malware
includes viruses, worms and trojan horses
worms
replicate itself in order to spread across a network
in order to do this it exploits vulnerabilities in a network
torjan horse
designed to access a computer by misleading the user of its intent
malicious software is designed to cause damage to a network or computer system
it attaches itself to files and programs on a computer system
phishing
designed to acquire sensitive information
commonly sent through email
telephone phishing
direct phone calls that pretend to be an official service
brute force
trial and error
can be used for gaining access to password-based entry systems
consists of an attacker entering possible passwords and phrases until one is correct
data interception and theft
packets that travel over networks can be intercepted
if packets are encrypted a key will be needed
packets reassembled by using a signature
SQL detection
social engineering
relies on human interaction
involves tricking users into breaking normal security procedures
DDOS
overloading a website with unwanted traffic
uses a number of computers over a network of infected machines which send requests to a website which would bring it offline
preventing attacks
penetration testing
tests conducted in a controlled envirmoent
network forensics
involves the examination of data sent across a network
packet sniffing
helps a user understand what is being sent across the network all the time
packet sniffing without written permission is a breach of the law
network policies
outline rules for network access
acceptable use policy (AUP)
anti malware software
aims to prevent malware from entering the system
firewalls
software that performs as a barrier
not 100% effective
can be held on a server or a stand alone computer
passwords
encryption
data is translated into code
julius ceasr
the key tells how many places along the alphabet the real letter is
user access levels
allows a system administrator to set up a hierarchy of users
lower level users = limited access
threats posed to networks
poor network policy
can expose a network to many threats
most networks restrict users to what they can and cant do
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Food Chains and Food Webs Quiz
Selam H
Mechanics
james_hobson
PHYSICS P1 1
x_clairey_x
GCSE Biology 4 OCR - The Processes of Life
blairzy123
Maths Revision- end of year test
hannahsquires
20 Study Hacks To Improve Your Memory
jen.sch.ca
Business Studies GCSE
phil.ianson666
GCSE AQA Biology - Unit 3
James Jolliffe
PSBD TEST 2-2
Suleman Shah
“The knower’s perspective is essential in the pursuit of knowledge.” To what extent do you agree with this statement?
Lucia Rocha Mejia
Chemistry GCSE Review - States of Matter, Particles, Atoms, Elements, Compounds and Mixtures
Morgan Overton
Browse Library