1.6 System Security

Description

Mind Map on 1.6 System Security, created by Casey Morris on 21/03/2018.
Casey Morris
Mind Map by Casey Morris, updated more than 1 year ago
Casey Morris
Created by Casey Morris about 6 years ago
72
0

Resource summary

1.6 System Security
  1. Forms of Attack
    1. Malware
      1. Brute Force
        1. Trial and error is a brute force attempt to access a computer system.
        2. Phising
          1. Denial Of Service
            1. It is a type of attack when multiple compromised systems which are often infected with trojan and uses it to target a single system.
            2. SQL injection
              1. Data interception and theft
                1. Data interception and theft is a hacker has stole data from a computer. They can do this by tapping a connection, intercepting wireless traffic, or plugging into a network and monitoring traffic.
              2. Phising is usually disguised as a used popular website or spammed messages so you provide your email address and other personal details. It pretends to be trustworthy.
                1. Encryption
                  1. where data is translated into code so that only authorised users, or users with the key can decrypt it.
                2. What is system security and cyber attacks?
                  1. A cyber attack is an attempt to gain unauthorised access to or control of a computer and the network which it is connected to
                    1. Security is a set of measures taken to protect a computer from harm to the data and software.
                    2. Reasons for Network security
                      1. Confidental data
                        1. Data Theft
                          1. Data Loss
                            1. Data Changes
                              1. Legal obligations
                              2. Worms are a network threat as they are hard to get rid of as they copy themselves over networks to external storage and other computers
                                1. Spyware collects your information and sends it to somebody.
                                  1. A keylogger can be either hardware or software. It is designed to record every key that is pressed on a keyboard, therefore giving access to all the data that is entered into a computer such as usernames, passwords or websites visited.
                                    1. A trojan is a program which is designed to deliberately trick a user in to downloading and installing malicious software.
                                      1. Identifying and preventing vulnerabilities
                                        1. Passwords
                                          1. Encryption
                                            1. Firewalls
                                              1. Network policies
                                                1. Network forensics
                                                  1. Penetration testing
                                                    1. User access levels
                                                    2. Social Engineering
                                                      1. Relies on human interaction
                                                        1. Commonly involves tricking users into breaking normal security procedures
                                                        2. Malware
                                                          1. It is malicious software that causes identify theft, financial loss and permanent file deletion.
                                                          2. Virus
                                                            1. A virus harms your computer in some way. It usually deletes or begins altering files and stops programs from running.
                                                              1. Around 82,00 viruses are made each day
                                                                1. Can affect all components of an operating system
                                                              2. DDOS
                                                                1. Overloads a website with unwanted traffic
                                                                2. The effects of a successful attack
                                                                  1. Execute queries, exposing data
                                                                    1. Delete data
                                                                      1. Altering data, resulting in data integrity issues
                                                                        1. Bypass authentication procedures and impersonate specific user
                                                                        2. Anti malware software
                                                                          1. Software with the aim of preventing malware from entering the system.
                                                                          2. Firewalls
                                                                            1. Software that performs a 'barrier' between a potential attack and the computer system
                                                                              1. Monitor application and network usage
                                                                                1. Can be held on a server, or a standalone computer
                                                                                2. Network Policies
                                                                                  1. Defines how a system can be secured through specific rules or requirements.
                                                                                    1. Explains how particular a user should access and treat a system
                                                                                    2. User Access Levels
                                                                                      1. also known as system access rights
                                                                                        1. allows a system administrator to set up a hierarchy of users.
                                                                                          1. Lower level users would have access to limited information and settings.
                                                                                            1. Higher level users can access the most sensitive data on the system
                                                                                            2. Biometric security
                                                                                              1. Can be used in addition to 'standard' password entry
                                                                                                1. Examples - retina scan, fingerprint, voice and facial recognition.
                                                                                                2. SQL injection
                                                                                                  1. attacks could access systems containing customer data, intellectual property and other sensitive information
                                                                                                    1. Malicious code to be user in an SQL query when it is run in order for the injection attack to take place.
                                                                                                    2. Network Forensics
                                                                                                      1. A branch of digital forensics
                                                                                                        1. Covers the forensic investigation of networks and their devices attached to them
                                                                                                          1. primarily involves the examination of data sent across a network
                                                                                                            1. May involve the user of various forensic techniques including 'packet sniffing'
                                                                                                              1. Packet sniffing involves the interception of packets across the network
                                                                                                                1. Packet sniffing tools can help users understand what is being sent around the network at the time.
                                                                                                            2. Penetration Testing
                                                                                                              1. Tests performed under a controlled environment by a qualified person
                                                                                                                1. Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they cannot be maliciously exploited.
                                                                                                                Show full summary Hide full summary

                                                                                                                Similar

                                                                                                                Business Studies Unit 2
                                                                                                                tara.springate
                                                                                                                GCSE PE - 1
                                                                                                                lydia_ward
                                                                                                                Cell Structure
                                                                                                                daniel.praecox
                                                                                                                SSAT Verbal Questions (Analogies)
                                                                                                                philip.ellis
                                                                                                                Cells, Tissues and Organs
                                                                                                                yusanr98
                                                                                                                AQA GCSE Biology B1 unit 1
                                                                                                                Olivia Phillips
                                                                                                                Macbeth Essay Notes
                                                                                                                Mel M
                                                                                                                Chemistry GCSE Review - States of Matter, Particles, Atoms, Elements, Compounds and Mixtures
                                                                                                                Morgan Overton
                                                                                                                Tips for Succeeding on the Day of the Exam
                                                                                                                Jonathan Moore
                                                                                                                1PR101 2.test - Část 17.
                                                                                                                Nikola Truong
                                                                                                                Study tips/hacks
                                                                                                                Sarah Biswas