Cyber Safety

Description

A mindmap summarising the video we watched in computing.
sonia :)
Mind Map by sonia :), updated more than 1 year ago
sonia :)
Created by sonia :) about 4 years ago
54
0

Resource summary

Cyber Safety
  1. When do we use computers
    1. In an office
      1. At home
        1. At shops
          1. Even at airports
          2. Technology helps..
            1. Fighting crimes
              1. Plays a key role in ensuring safety by adressing security issues
                1. In the health sector
                2. Financial Transactions
                  1. Helps in communication
                    1. Helps us remain connected to the outside world
                      1. Affects daily quality of our lives
                        1. Internet has evolved through the years
                          1. Considered the most significant invention in the last 30 years
                            1. Many issues like child bullying and account hacking still exists
                            2. Account Hacking
                              1. Fake emails claiming you have "won cash"
                                1. User gives away important details
                                  1. Called email Spoofing
                                  2. Email Spoofing
                                    1. Phishing
                                      1. signs
                                        1. Spelling mistakes
                                          1. Not personalised e.g not addressing you by your name
                                            1. Sounding desperate for info
                                        2. If they say things such as hi or dear customer, they are not personalising the email for you and so it may be fake
                                          1. Trojan Horse
                                            1. A virus that steals information from your computer without you knowing
                                          2. Computer misuse
                                            1. Looking at other people's data
                                              1. Trying to use their data or share the data
                                                1. If you alter the data
                                                  1. Why do they do this
                                                    1. Some do it for pure mischief, or for a challenge
                                                      1. To steal money
                                                        1. To steal or modify data
                                                          1. For political reason's, to expose wrongdoing, or to get revenge on people with opposing views
                                                        2. How do hackers do it?
                                                          1. Taking advantage of security weaknesses in older computer software such as Windows XP, which no longer receives automatic anti-virus updates from Microsoft
                                                            1. Taking advantage of common/obvious common usernames and passwords.
                                                              1. Tricking people into downloading malware onto their computer, which in turn gives the hacker access to view and modify your files.
                                                              2. What is malware?
                                                                1. It stands for 'malicious software'
                                                                  1. It is a small program which enters a computer or network through a downloaded file or vulnerability in a network.
                                                                    1. Malware could...
                                                                      1. Gather personal or sensitive info
                                                                      2. Types of malware
                                                                        1. Hijacks some browser for example your default search page, or diverts you to particular websites. Also called Spyware
                                                                          1. File infector: The virus infects a particular file. It may completely or partially overwrite a file.
                                                                            1. Macro virus- Embedded in the template files (for example, of Word or Excel). The virus spreads
                                                                              1. Signs of a malware
                                                                                1. A new toolbar appears on your browser
                                                                                  1. Your home page has changed unexpectedly
                                                                                    1. You are on a genuine website and your browser alerts you it has blocked a pop-up window
                                                                                      1. You see adverts though you are offline
                                                                                        1. Your computer hard disk is overtirme
                                                                                          1. How to avoid malware
                                                                                            1. Avoid clicking on everything, e.g. offers that seem too good to be true
                                                                                              1. Don't visit illegal sites, such as those that let you download copyright material
                                                                                                1. Make sure your browser is configured to always ask before running files
                                                                                                  1. Install up-to-date- antivirus software
                                                                                                    1. Keep your browser software up -to-date
                                                                                              2. Logic Bombs
                                                                                                1. A logic bomb tells the computer to execute a set of instructions at a certain date and time or under certain specified conditions.
                                                                                                2. Ransomware
                                                                                                  1. Ransomware is software illegaly installed on a computer so that the user of cannot access their files until a ransom is paid
                                                                                                  2. Virus
                                                                                                    1. a virus is a type of software
                                                                                                      1. A computer virus replicates and installs itself without your consent
                                                                                                        1. a virus can be spread through another computer through email files
                                                                                                          1. Key logging- When they can see what you have typed and then they can get your username and password
                                                                                                        Show full summary Hide full summary

                                                                                                        Similar

                                                                                                        A level Computing Quiz
                                                                                                        Zacchaeus Snape
                                                                                                        Types and Components of Computer Systems
                                                                                                        Jess Peason
                                                                                                        Input Devices
                                                                                                        Jess Peason
                                                                                                        Output Devices
                                                                                                        Jess Peason
                                                                                                        Computing
                                                                                                        Kwame Oteng-Adusei
                                                                                                        Pack of playing cards answer
                                                                                                        Karl Taylor
                                                                                                        Code Challenge Flow Chart
                                                                                                        Charlotte Hilton
                                                                                                        E - Saftey
                                                                                                        Gabriella Boyd
                                                                                                        Computing Introduction Example Mindmap
                                                                                                        fthurlow
                                                                                                        Computing Hardware - CPU and Memory
                                                                                                        ollietablet123