yr10 Cyber Security

Description

Year 10 IT Mind Map on yr10 Cyber Security, created by Hannah BELSEY on 11/06/2020.
Hannah BELSEY
Mind Map by Hannah BELSEY, updated more than 1 year ago
Hannah BELSEY
Created by Hannah BELSEY almost 4 years ago
4
0

Resource summary

yr10 Cyber Security
  1. KEY TERMS
    1. Attack
      1. an attack is a deliberate action, targeting an organisation's digital system or data
      2. Threat
        1. a threat is an icident or an action which is a deliberate or unintended that results in disruption, down time or data loss
          1. External
            1. caused outside the organisation
            2. Internal
              1. caused by an incident inside an organisation
            3. Cyber Security
              1. refers to the range of measures that can be taken to protect computer systems, networks and date from unauthorised access or cyberattack
              2. Unauthorised Access
                1. this refers to someone gaining entry without permission to an organisation's system, software, or data. This is achieved by exploiting a security vulnerability
              3. Hackers
                1. Black Hat Hacker
                  1. is someone who tries to inflict damage by compromising securiy systems
                  2. Hacker
                    1. is someone who seeks out and exploits these vulnerabilities
                    2. Grey Hat Hacker
                      1. is someone who does it for fun and not with malicious intent
                      2. White Hat Hacker
                        1. is someone who works with organizations to strengthen the security of a system
                      3. Types of Threats
                        1. MALWARE
                          1. Malicious Sofftware. This is an umbrella term given to software that is designed to harm a digital system, damage data or harvest sensitive information.
                            1. Worm
                              1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at tremendous rate, usuing up hard drive space and bandwidth, overloading servers.
                              2. Virus
                                1. a piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                2. Trojan Horse
                                  1. Users are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task
                                  2. Rootkit
                                    1. Designed to remotely access and control a computer system without being detected by security software or the user
                                    2. Ransomware
                                      1. Encrypts files stored on a computer to extort/demand or steal money from organisations
                                      2. Spyware
                                        1. Is secretly installed to collect information from someone else's computer
                                        2. Keyloggers
                                          1. Spyware that records every keystroke made on a computer to steal personal information
                                          2. Adware
                                            1. Automatically shows adverts such as popups. Most adware is harmless but some contain spyware such as keyloggers
                                            2. Botnet
                                              1. Bots take control of a computer system, without the user's knowledge. A botnet is a large collection of malware-infected devices (zombies). An attacker ('bot herder') chooses when to 'wake' the zombies to perform an attack
                                              2. Distributed Denial-of-Service attack (DDoS attack)
                                                1. flooding a website with useless traffic to inundate and overwhelm the network
                                            3. Social Engineering
                                              1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes
                                                1. shoulder surfing/shouldering
                                                  1. it involves the attacker watching the victim while they provide sensitive information (E.g. Watching someone put in their pin at a cash point)
                                                  2. Phishing
                                                    1. is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted
                                                    2. Pharming
                                                      1. is when a victim redirects the user from a genuine website to a fake one (Some pharming sites are so expertly copied from the genuine website that it is very difficult to identity therefore this is carried out without the user knowing about it )
                                                      2. Blagging/Pretexting
                                                        1. is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money
                                                        2. Tailgating/piggybacking
                                                          1. Trying to gain access to a secure room or building. E.g. a common type of this taking place is pretending to be a delivery driver and asking an authorised person to hold the door so they can enter the building
                                                          2. Baiting
                                                            1. Cyber criminals make a promise of goods to get the information that they need. Eg. promise free downloads to a film for login details
                                                            2. Quid Pro Quo
                                                              1. Cyber criminals make a promise of a service to get the information that they need.
                                                            Show full summary Hide full summary

                                                            Similar

                                                            Project Communications Management
                                                            farzanajeffri
                                                            Common Technology Terms
                                                            Julio Aldine Branch-HCPL
                                                            Network Protocols
                                                            Shannon Anderson-Rush
                                                            Abstraction
                                                            Shannon Anderson-Rush
                                                            Computing
                                                            Kwame Oteng-Adusei
                                                            HTTPS explained with Carrier Pigeons
                                                            Shannon Anderson-Rush
                                                            Introduction to the Internet
                                                            Shannon Anderson-Rush
                                                            Construcción de software
                                                            CRHISTIAN SUAREZ
                                                            Historical Development of Computer Languages
                                                            Shannon Anderson-Rush
                                                            Useful String Methods
                                                            Shannon Anderson-Rush
                                                            Web Designing & Development Full Tutorial
                                                            Nandkishor Dhekane