Cyber Security

Description

Mind Map on Cyber Security, created by Veerun SANGHERA on 08/06/2020.
Veerun SANGHERA
Mind Map by Veerun SANGHERA, updated more than 1 year ago
Veerun SANGHERA
Created by Veerun SANGHERA almost 4 years ago
7
0

Resource summary

Cyber Security
  1. Key Terms
    1. Unauthorised Access
      1. This refers to someone gaining entry without permission to an organisation’s system, software or data. This achieved by exploiting a security vulnerability
      2. Cyber Security
        1. refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyber attack.
        2. Attack
          1. An attack is a deliberate action, targeting an organisation's digital system or data
          2. Threat
            1. external
              1. caused outside the organisation
              2. internal
                1. caused by an incident inside an organisation
                2. is an incident or action which is deliberate or unintended that results in disruption, downtime or data loss
              3. Hackers
                1. Black hat
                  1. Is someone who tries to inflict damage by compromising security systems
                  2. White hat
                    1. Is someone who works with organisations to strengthen the security of a system
                    2. Grey hat
                      1. Is someone who does it for fun and not with malicious intent
                    3. Types of threats
                      1. Malware
                        1. Worm
                          1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at at tremendous rate using up hard drive space and bandwidth, overloading servers
                          2. Virus
                            1. A piece of malicious code that attaches to a legitimate program. it is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                            2. Malicious software this is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information
                              1. Trojan horse
                                1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                                2. Rootkit
                                  1. Designed to remotely access and control a computer system without being detected by security software or the user.
                                  2. Ransomware
                                    1. Encrypts files stored on a computer to extort/demand or steal money from organisations
                                    2. Spyware
                                      1. Is secretly installed to collect information from someone else's computer
                                      2. Adware
                                        1. Automatically shows adverts such as popups.
                                        2. Keyloggers
                                          1. spyware that records every keystroke made on a computer to steal personal information
                                          2. Distributed Denial-of-Service attack (DDoS attack)
                                            1. flooding a website with useless traffic to inundate and overwhelm the network
                                            2. Bot net
                                              1. Bots take control of a computer system, without the user’s knowledge. A botnet is a large collection of malware-infected devices (zombies). An attacker (‘bot herder’) chooses when to ‘wake’ the zombies to perform an attack.
                                          3. Social Engineering
                                            Show full summary Hide full summary

                                            Similar

                                            CyberSecurity
                                            Stephen Williamson
                                            CSS exam
                                            Andy Oung
                                            cyber security
                                            Samuel Melendez
                                            Certified Information Systems Security Professional (CISSP)
                                            GoAsk Chaz
                                            Artificial Intellegence
                                            nicky elin
                                            Pears of Wisdom - Security Concepts
                                            Alex Poiry
                                            CSS exam_1
                                            Andy Oung
                                            Phishing Mindmap Salvy
                                            Salvy Ganpatsingh
                                            cyber security
                                            Jacqui Breeds
                                            STATES OF MATTER
                                            iamawesomelyepic
                                            Biology F212 - Biological molecules 1
                                            scarlettcain97