Cyber security

Description

Mind Map on Cyber security, created by Josselyn MOORE on 08/06/2020.
Josselyn MOORE
Mind Map by Josselyn MOORE, updated more than 1 year ago
Josselyn MOORE
Created by Josselyn MOORE almost 4 years ago
9
0

Resource summary

Cyber security
  1. key terms
    1. attack
      1. an attack is a deliberate action targeting an organisation's digital system or data
      2. threats
        1. A threat is an incident or an action which is deliberate or unintended that results in the distribution,down time or loss of data
          1. Internal threat: caused by an incident inside an organisation
            1. External threat: caused outside the organisation
          2. cyber security
            1. refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyber attack
            2. unauthorised access
              1. this refers to someone gaining entry without permission to an organisation's system, software or data
                1. achieved by exploiting a security vulnerability
              2. hacker
                1. someone who seeks out and exploits these vulnerabilities
                  1. black hat hacker
                    1. someone who tries to inflict damage by compromising security system
                    2. grey hat hacker
                      1. someone who does it for fun and not with malicious intent
                      2. white hat hacker
                        1. someone who works with organisations to strengthen the security of a system
                    3. types of threats
                      1. malware
                        1. malicious soft ware
                          1. this is an umbrella term given to software that is designed to harm a digital system,damage data or harvest sensitive information
                          2. virus
                            1. a piece of malicious code that attaches to a legitimate program. it is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                            2. worm
                              1. they get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. they self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers
                              2. trojan Horse
                                1. users are tricked into downloading it to their computer,once installed it works undercover to carry out a predetermined task.
                                2. rootkit
                                  1. designed to remotely access and control a computer system without being detected by security software or the user.
                                  2. ransomware
                                    1. encrypts files stored on a computer to extort/demand or steal money from organisations
                                    2. spyware
                                      1. is secretly installed to collect information form someone else's computer
                                      2. keyloggers
                                        1. spyware that records every keystroke made on a computer to steal personal information
                                        2. adware
                                          1. automatically shows adverts such as popups
                                            1. most adware is harmless but some contain spyware such as keyloggers
                                          2. botnet
                                            1. take control of computer systems , without the user's knowledge.
                                              1. a botnet is a large collection of malware-infected devices (zombies)
                                                1. an attacker ('bot herder') chooses when to 'wake' the zombies to perform an attacker
                                              2. ddos
                                                1. flooding a website with useless traffic to inundate and overwhelm the network
                                            2. social engineering
                                              1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudlent purposes
                                                1. shoulder surfing/shouldering
                                                  1. it involves the attacker watching the victim while they provide sensitive information
                                                  2. phising
                                                    1. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
                                                      1. the email usually provides a link to another website where the information can be inputted
                                                    2. pharming
                                                      1. is when a victim redirects the user from a genuine website to a fake one
                                                        1. some pharming sites are so expertly copied from the genuine website that it is very difficult to identify therefore this is carried out without the user knowing about it
                                                        2. blagging/pretexting
                                                          1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money
                                                          2. tailgating/piggybacking
                                                            1. trying to gain access to a secure room or building
                                                            2. bating
                                                              1. cyber criminals make a promise of goods to get their information that they need
                                                              2. quid pro qou
                                                                1. cyber criminals make a promise of a service to get the information that they need
                                                              Show full summary Hide full summary

                                                              Similar

                                                              CyberSecurity
                                                              Stephen Williamson
                                                              CSS exam
                                                              Andy Oung
                                                              cyber security
                                                              Samuel Melendez
                                                              Certified Information Systems Security Professional (CISSP)
                                                              GoAsk Chaz
                                                              Artificial Intellegence
                                                              nicky elin
                                                              Pears of Wisdom - Security Concepts
                                                              Alex Poiry
                                                              CSS exam_1
                                                              Andy Oung
                                                              Phishing Mindmap Salvy
                                                              Salvy Ganpatsingh
                                                              cyber security
                                                              Jacqui Breeds
                                                              CARDIOVASCULAR SYSTEM
                                                              offintowonderland
                                                              OCR Gateway GCSE P3 Revision Quiz
                                                              xhallyx