cyber security

Description

Mind Map on cyber security, created by Jonathan FREEMAN on 08/06/2020.
Jonathan FREEMAN
Mind Map by Jonathan FREEMAN, updated more than 1 year ago
Jonathan FREEMAN
Created by Jonathan FREEMAN almost 4 years ago
7
0

Resource summary

cyber security
  1. key terms
    1. unauthorised access
      1. refers to someone gaining entry without permision to a system
      2. attack
        1. a delibarate action targeting an organisations digital systems
        2. threat
          1. internal
            1. incident inside an organisation
            2. external
              1. caused outside the organisation
              2. an action that is delibarate
              3. cyber security
                1. refers to range of measures that can be taken to protect computer systems networks and data from unauthorised access or cyber attack
              4. hackers
                1. someone who seeks out and exploits these vulnerabilities.
                  1. Black hat hacker
                    1. someone who tries to inflict damage by compramising security systems
                    2. grey hat hacker
                      1. someone who does it for fun and not with malicious intent
                      2. white hat hacker
                        1. someone who works with organisation to strengthen the security systems
                      3. types of threats
                        1. malicious software
                          1. this an umbrella term given to a software that is designed to harm digital systems
                          2. virus
                            1. a piece of malicious code that attaches to a legitimate programme
                            2. worm
                              1. worms get around by exploiting vulnerbilities is digital systems
                            3. malware
                              1. trojan horse
                                1. users are tricked to download it onto their computers once installed it does the permitted task
                                2. Rootkit
                                  1. designed to acceess and control a computer system without being detected
                                  2. ransomware
                                    1. encrypts files stored on a computer to steal money
                                    2. spyware
                                      1. secretly installed to collect information
                                      2. key loggers
                                        1. spyware that records every keystroke to steal information
                                        2. adware
                                          1. autimaticy shows adverts and popups
                                          2. bot net
                                            1. bots take control of the system without the user noticing
                                            2. DDoS
                                            3. social engineering
                                              1. shoulder surfing
                                                1. watching the victim over their shoulder while they put in information
                                                2. phising
                                                  1. the victim recieves an email that looks serious but is a scam
                                                  2. pharming
                                                    1. the victim gets redirected from one website to a fake one
                                                    2. blagging
                                                      1. the attacker gives the victim a scenario so they give them money
                                                      2. tailgating
                                                        1. trying to gain access to secure a room or building
                                                        2. quid pro quo
                                                          1. cyber criminals make a promise and then they get what they need
                                                        Show full summary Hide full summary

                                                        Similar

                                                        CyberSecurity
                                                        Stephen Williamson
                                                        CSS exam
                                                        Andy Oung
                                                        cyber security
                                                        Samuel Melendez
                                                        Certified Information Systems Security Professional (CISSP)
                                                        GoAsk Chaz
                                                        Artificial Intellegence
                                                        nicky elin
                                                        Pears of Wisdom - Security Concepts
                                                        Alex Poiry
                                                        CSS exam_1
                                                        Andy Oung
                                                        Phishing Mindmap Salvy
                                                        Salvy Ganpatsingh
                                                        cyber security
                                                        Jacqui Breeds
                                                        A Level: English language and literature techniques = Lexis
                                                        Jessica 'JessieB
                                                        Coastal Landscapes
                                                        Chima Power