Cyberattacks

Description

Year 11 Computer Science Mind Map on Cyberattacks, created by Holly Dooley on 20/09/2018.
Holly Dooley
Mind Map by Holly Dooley, updated more than 1 year ago
Holly Dooley
Created by Holly Dooley over 5 years ago
11
0

Resource summary

Cyberattacks

Attachments:

  1. A cyberattack is an attempt by hackers to damage or destroy a computer network or system.
    1. Cyber attacks exploit us using a network or technical weakness to:
      1. Obtain data stored on the network
        1. Delete or modify data
          1. Make the system unusable
        2. Social engineering
          1. Phishing
            1. Emails claiming or appearing to be from a bank or building society e-commerce site, asking for details of passwords and credit cards.
            2. Shoulder surfing
              1. Finding passwords and PINs (Personal Identification Numbers) by watching people enter them.
              2. Targeting the users
                1. Social engineering involves tricking people into divulging secret information such as passwords and login information.
              3. Technical weaknesses
                1. Unpatched software
                  1. As software is used security flaws are discovered which can be exploited by hackers. The makers release patches to fix security issues but they have to be applied and often are forgotten about
                  2. USB devices
                    1. Employees could attach portable devices containing flash drives and copy sensitive information. They could also try to install software onto the network and introduce malware.
                    2. Smart devices
                      1. At home, such as kettles and fridges, are usually unprotected and can be targeted by hackers. They have been used to launch denial of service attacks.
                      2. Eavesdropping
                        1. The interception of digital communications. This is done by: directly listening to digital or analogue voice communication; the interception or 'sniffing' of data relating to any form of communication
                          1. Criminals use packet analysers or 'packet sniffers' to intercept the transmitted data packets, which are then analysed and their data decoded. The criminals can therefore steal sensitive data such as logins, passwords, credit card numbers and PINs. Encrypting data on a network is essential so that it cannot be of use if it is intercepted by eavesdropping.

                        Media attachments

                        Show full summary Hide full summary

                        Similar

                        Computing Hardware - CPU and Memory
                        ollietablet123
                        SFDC App Builder 2
                        Parker Webb-Mitchell
                        Data Types
                        Jacob Sedore
                        Intake7 BIM L1
                        Stanley Chia
                        Software Processes
                        Nurul Aiman Abdu
                        Design Patterns
                        Erica Solum
                        CCNA Answers – CCNA Exam
                        Abdul Demir
                        Abstraction
                        Shannon Anderson-Rush
                        Spyware
                        Sam2
                        HTTPS explained with Carrier Pigeons
                        Shannon Anderson-Rush
                        Data Analytics
                        anelvr