Cyber Security - 19/06

Description

Year 9 IT Mind Map on Cyber Security - 19/06, created by Callum HOLMAN-HATHAWAY on 11/06/2020.
Callum HOLMAN-HATHAWAY
Mind Map by Callum HOLMAN-HATHAWAY, updated more than 1 year ago
Callum HOLMAN-HATHAWAY
Created by Callum HOLMAN-HATHAWAY almost 4 years ago
13
0

Resource summary

Cyber Security - 19/06
  1. Key Terms
    1. Attack
      1. An attack is a deliberate action, targeting an organisation’s digital system or data.
      2. Threat
        1. A threat is an incident or an action which is deliberate or unintended that results in disruption, down time or data loss.
          1. Internal & External Threat
            1. Internal Threat = caused by an incident inside an organisation
              1. External Threat = caused outside the organisation
          2. Cyber Security
            1. Cyber Security refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyber-attack.
            2. Unauthorised Access
              1. This refers to someone gaining entry without permission to an organisation’s system, software or data. This achieved by exploiting a security vulnerability
              2. Social Engineering
                1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes
                  1. Shoulder Surfing/Shouldering involves the attacker watching the victim while they provide sensitive information
                    1. Phishing is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                      1. Pharming is when a victim redirects the user from a genuine website to a fake one.
                        1. Blagging/Pretexting is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money. And it also happens on Calls and Emails! Even on TV ads
                          1. Tailgating/Piggybacking Trying to gain access to a secure room or building. E.g. a common type of this taking place is pretending to be a delivery driver and asking an authorised person to hold the door so they can enter the building
                            1. Baiting Cyber criminals make a promise of goods to get the information that they need. Eg. promise free downloads to a film for login details
                    2. Hackers
                      1. A hacker is someone who seeks out and exploits peoples data
                        1. A Black Hat Hacker is someone who tries to inflict damage by compromising security systems
                          1. A White Hat Hacker is someone who works with organisations to strengthen the security of a system
                          2. A Grey Hat hacker is someone who does it for fun and not with malicious intent
                          3. Types of Threats
                            1. Malware
                              1. Malicious Software is designed to harm a digital system, damage data or harvest sensitive information.
                                1. Trojan Horse are users that are tricked into downloading it to their computer. Once installed the Trojan works undercover to carry out a predetermined task.
                                  1. Ransomware encrypts files stored on a computer to extort/demand or steal money from organisations.
                                    1. Spyware is secretly installed to collect information from someone else's computer
                                      1. DDoS Attack is a person flooding a website with useless traffic to inundate and overwhelm the network
                                      2. Keyloggers are spyware that records every keystroke made on a computer to steal personal information
                                        1. Botnet is bots take control of a computer system, without the user’s knowledge. A botnet is a large collection of malware-infected devices (zombies). An attacker (‘bot herder’) chooses when to ‘wake’ the zombies to perform an attack.
                                        2. Adware is Automatically shows adverts such as popups. Most adware is harmless but some contain spyware such as keyloggers
                                        3. Virus is a piece of malicious code that attaches to a legitimate program. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
                                          1. Worms get around by exploiting vulnerabilities in operating systems and attaching themselves to emails. They self replicate at a tremendous rate, using up hard drive space and bandwidth, overloading servers.
                                        Show full summary Hide full summary

                                        Similar

                                        Project Communications Management
                                        farzanajeffri
                                        Common Technology Terms
                                        Julio Aldine Branch-HCPL
                                        Network Protocols
                                        Shannon Anderson-Rush
                                        Abstraction
                                        Shannon Anderson-Rush
                                        Computing
                                        Kwame Oteng-Adusei
                                        HTTPS explained with Carrier Pigeons
                                        Shannon Anderson-Rush
                                        Introduction to the Internet
                                        Shannon Anderson-Rush
                                        Construcción de software
                                        CRHISTIAN SUAREZ
                                        Historical Development of Computer Languages
                                        Shannon Anderson-Rush
                                        Useful String Methods
                                        Shannon Anderson-Rush
                                        Web Designing & Development Full Tutorial
                                        Nandkishor Dhekane