Cyber security

Description

Year 10 IT Mind Map on Cyber security, created by Toby STEPHENS on 05/05/2020.
Toby STEPHENS
Mind Map by Toby STEPHENS, updated more than 1 year ago
Toby STEPHENS
Created by Toby STEPHENS almost 4 years ago
2
0

Resource summary

Cyber security
  1. Threat
    1. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
      1. Internal Threat = caused by an incident inside an organisation
        1. External Threat = caused outside the organisation
          1. Attack
            1. An attack is a deliberate action, targeting an organisation’s digital system or data.
          2. Unauthorised Access
            1. This refers to someone gaining entry without permission to an organisation’s system, software or data.
            2. Hacker
              1. Black Hat
                1. They try to inflict damage by compromising security systems
                2. Grey Hat
                  1. Do it for fun and not with malicious intent
                  2. White Hat
                    1. working with organizations to strengthen the security of a system
                  3. MALWARE (AKA Malicious software)
                    1. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                      1. Virus (Not a human virus)
                        1. A piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
                        2. Worm
                          1. A self-contained program that is capable of spreading on it's own without human help. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                          2. Trojan
                            1. It is a type of Malware that is hidden in legitimate sotware.
                            2. Rootkit
                              1. Is a set of tools that give a hacker a high level administrative control, of a computer.
                              2. Ransomware
                                1. Encrypts files stored on a computer to extort or steal money from organisations. Victims must then pay a ransom to have the encrypted files unlocked. There is normally a deadline for the transaction to happen.
                                2. Spyware
                                  1. Is a malicious software secretly installed to collect information from someone else's computer
                                    1. Keyloggers
                                      1. spyware that records every keystroke made on a computer to steal personal information
                                  Show full summary Hide full summary

                                  Similar

                                  Project Communications Management
                                  farzanajeffri
                                  Common Technology Terms
                                  Julio Aldine Branch-HCPL
                                  Network Protocols
                                  Shannon Anderson-Rush
                                  Abstraction
                                  Shannon Anderson-Rush
                                  Computing
                                  Kwame Oteng-Adusei
                                  HTTPS explained with Carrier Pigeons
                                  Shannon Anderson-Rush
                                  Introduction to the Internet
                                  Shannon Anderson-Rush
                                  Construcción de software
                                  CRHISTIAN SUAREZ
                                  CyberSecurity
                                  Stephen Williamson
                                  Historical Development of Computer Languages
                                  Shannon Anderson-Rush
                                  Useful String Methods
                                  Shannon Anderson-Rush