Learning Aim B: Cyber security


Mind Map on Learning Aim B: Cyber security, created by Luke WATERS on 05/01/2020.
Mind Map by Luke WATERS, updated more than 1 year ago
Created by Luke WATERS over 3 years ago

Resource summary

Learning Aim B: Cyber security
  1. Cyber Security
    1. Refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyber attack.
    2. Threat
      1. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
        1. Internal
          1. Caused by an incident inside an organisation
          2. External
            1. Caused outside the organisation
        2. Attack
          1. An attack is a deliberate action, targeting an organisation's digital system or data.
          2. Unauthorised Access
            1. This refers to someone gaining entry without permission to an organisation's system, software or data
              1. Hacker
                1. Black Hat
                  1. They try to inflict damage by compromising security systems
                  2. Grey Hat
                    1. Do it for fun and not with malicious intent
                    2. White
                      1. Working with organisations to strength the security of a system
                2. Why are systems attacked?
                  1. Fun/Challenge
                    1. - Hacking systems can be fun or a challenge
                      1. There is a sense of achievement
                        1. Friends may give respect of hacking achievements
                    2. Financial gain
                      1. Ransoms can be made to prevent attacks form happening
                        1. Ransomware can be used to encrypt a computer until you pay
                          1. A payment is given to carry out an attack on an organisation
                      2. Dispution
                        1. Attacks such as Denial-of-Service stop websites working
                          1. Viruses can slow down computers and delete files
                        2. Industrial Espionage - Spying in companies
                          1. The aim is find intellectual property such as designs or blueprints for products, business strategies or software sort code
                          2. Personal attack
                            1. Employees that are unhappy may attack the company
                              1. Friends / family may attack each other if upset over something
                            2. Information/ Data Theft
                              1. Credit card and financial details are stolen to gain money
                                1. Company information may also be stolen
                            3. Malware
                              1. Malicious Software
                                1. This an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information
                                  1. Virus
                                    1. A piece of malicious code that attaches to a legitimate program. it is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                    2. Worm
                                      1. Similar to virus but unlike a virus but unlike a virus it is a self contained program. It is capable of spreading on it own, without help from humans. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                  Show full summary Hide full summary


                                  Spanish Vocabulary- Beginner
                                  Orwell and 1984
                                  Polina Strich
                                  Elliot O'Leary
                                  Biology AS Level Vocab- OCR- Chapters 1 and 2
                                  Laura Perry
                                  GCSE REVISION TIMETABLE
                                  Biology B3
                                  James Burns
                                  Chemistry revision
                                  Jordyn Niu
                                  Economic Growth
                                  Maya Khangura
                                  Chapter 16: The Cold War
                                  Becca Strobbe