null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
22477970
Learning Aim B
Description
Mind Map on Learning Aim B, created by Huey FREEMAN on 01/05/2020.
No tags specified
gcse
Mind Map by
Huey FREEMAN
, updated more than 1 year ago
More
Less
Created by
Huey FREEMAN
almost 4 years ago
8
0
0
Resource summary
Learning Aim B
Key Terms
Threats
an incident or action which is deliberate or unintended that results in disruption, down time or data loss
internal
caused by an incident inside an orgaisation
external
caused outside the organisation
Attack
a deliberate action towards a organisations digital system or data
cyber security
the range of measuresthat can be taken to protect a computer system
unauthorised access
refers to someone gaining entry without permission to organisations system, software or data. This achieved by exploiting a security vunerability
Hacker
is someone who seeks out, and exploits these vunerabilities
3 types of hacker
white
working with organisations to help them with security systems
grey
do it for fun with no intent of damage
black
try to cause damage by compromising security systems
Why are systems attacked link
Attachments:
Why are systems attacked
MALWARE
Virus
A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
BTEC IT 2
taylorb11
B7: Further Biology
Matthew Law
How Parliament Makes Laws
harryloftus505
IGCSE Chemistry Revision
sachakoeppen
Teaching Using GoConqr's Tools
Micheal Heffernan
Test your English grammar skills
Brad Hegarty
Using GoConqr to learn French
Sarah Egan
Testing for ions
Joshua Rees
The Circulatory System
Johnny Hammer
What You Can Do Using GoConqr
Micheal Heffernan
Information security and data protection
хомяк убийца
Browse Library