Cyber Security

Description

Year 10 IT Mind Map on Cyber Security, created by Kyle FINN on 08/06/2020.
Kyle FINN
Mind Map by Kyle FINN, updated more than 1 year ago
Kyle FINN
Created by Kyle FINN almost 4 years ago
8
0

Resource summary

Cyber Security
  1. key terms
    1. Threats
      1. A Threat is an action which is deliberated that results in disruption, down time and/or data loss
        1. Internal Threat
          1. can be caused by an incident inside an organisation
          2. External Threat
            1. can be caused outside of the organisation
        2. Attack
          1. An attack is a deliberate action, targeting an organisation's digital systems and/or data
          2. Unauthorised Access
            1. Unaurthorised access refers to someone getting/gaining entry without permission to an organisations system, software and/or data
              1. This is achieved by exploiting a security's vunerability
            2. Cyber Security
              1. Cyber Security is a range of measures that can be taken to protect a computer and its systems, network and data from cyberattacks and unorthorised access
            3. Hackers
              1. Hacker
                1. A Hacker is someone who seeks out to exploit these vunerabilities
                2. Black Hat Hacker
                  1. A Black Hat Hacker is someone who tries to inflict damage by compromising security systems
                  2. Grey Hat Hacker
                    1. A Grey Hat Hacker is someone who does it for fun and doesn't do it with malicious intent
                    2. White Hat Hacker
                      1. A White Hat Hacker is someone who works with organisations to strengthen the security of their systems
                    3. Types Of Threats
                      1. Malware
                        1. Virus
                          1. This is a piece of malicious code that attaches to a legitimate program. it's capable of reproducing itself and usually capable of causing great harm to data and/or other program files in the computer
                          2. Worm
                            1. Worms get around data by exploiting vunerabilities in operationg systems and attaching themselves to emails
                              1. Worms self replicate at a tremedous rate, using up hard drive/ SSD space and bandwidth, overloading servers
                              2. Malicious Software
                                1. This is an umbrella term given to a software that is designed to harm a digital system, damage data and/or harvest sensitive information
                                2. Rookit
                                  1. This is designed to remotley access and control a computer system without being detected by security software or the user of the computer
                                  2. Spyware
                                    1. Spyware is secretly installed to collect information from someone else's computer
                                    2. Keyloggers
                                      1. This is spyware that tecords every keystroke made on a computer to steal personal information such as passwords for bank cards and other things like this
                                      2. Adware
                                        1. Adware automatically shows adverts such as popups, mostadware is harmless but can contain spyware suck as keyloggers
                                        2. Botnet
                                          1. These are bots that take control of a computer without the user realizing
                                            1. A botnet is a large collection of malware-infected devise (zombies)
                                              1. An attacker (bot herder) chooses when to wake the zombies to perform an attack
                                              2. DDoS Attack
                                                1. Commenly known as Distributed Denial-of-Service attack
                                                  1. This floods a website with usless traffic to inundate and overwhelm the network
                                                  2. Trojan Horse
                                                    1. this piece of sofware tricks users into downloading it to their computer. once it's installed the trojan horse works undercover to carry out a predetermind task
                                                    2. Ransomeware
                                                      1. Ransomeware encrypts files stored on a computers hard drive/ ssd to extort/ demand or steal money from other organisations
                                                  3. Social Engeneering
                                                    1. Shoulder Surfing/ Shouldering
                                                      1. This envolves the attacher watching the victim while they provide sensitive information
                                                      2. Phishing
                                                        1. This is an attach in which the victim recieves an email disguised to look as it has come from a reputable source. In order to trick them into giving up valuable data.
                                                          1. This email would usually provide a link to another where the information can be inputted
                                                        2. Pharming
                                                          1. Is when a victim redirects the user from a genuin website to a fake website
                                                            1. Some Phariming techniques are when the page is coppied so it looks genuin but in fact is a fake and is very hard to identify, this means the user may not acknolage it
                                                          2. Blaggin/ Pretexting
                                                            1. This is an attack in which the perperator invents a scenario in order to convince the victim to give them data or money
                                                            2. Tailgating/ piggybacking
                                                              1. This is trying to gain access to a secure room or building
                                                              2. Baiting
                                                                1. Cyber criminals make a promise of goods to get the information that they need
                                                                2. Quid Pro Qou
                                                                  1. Cyber criminals make a promise of a service to get the information that they need
                                                                Show full summary Hide full summary

                                                                Similar

                                                                Project Communications Management
                                                                farzanajeffri
                                                                Common Technology Terms
                                                                Julio Aldine Branch-HCPL
                                                                Network Protocols
                                                                Shannon Anderson-Rush
                                                                Abstraction
                                                                Shannon Anderson-Rush
                                                                Computing
                                                                Kwame Oteng-Adusei
                                                                HTTPS explained with Carrier Pigeons
                                                                Shannon Anderson-Rush
                                                                Introduction to the Internet
                                                                Shannon Anderson-Rush
                                                                Construcción de software
                                                                CRHISTIAN SUAREZ
                                                                CyberSecurity
                                                                Stephen Williamson
                                                                Historical Development of Computer Languages
                                                                Shannon Anderson-Rush
                                                                Useful String Methods
                                                                Shannon Anderson-Rush