Cyber Security

Description

Mind Map on Cyber Security, created by Ethan STEVENS on 11/06/2020.
Ethan STEVENS
Mind Map by Ethan STEVENS, updated more than 1 year ago
Ethan STEVENS
Created by Ethan STEVENS almost 4 years ago
84
0

Resource summary

Cyber Security
  1. is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
    1. Key Terms
      1. The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years.
        1. Against that backdrop, highly personal and sensitive information such as social security numbers were recently stolen in the Equifax hack, affecting over 145 million people.
          1. Cyber security's core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access - both online and at work - from theft or damage. It's also about preventing unauthorised access to the vast amounts of personal information we store on these devices, and online.
            1. Cyber security is important because smartphones, computers and the internet are now such a fundamental part of modern life, that it's difficult to imagine how we'd function without them. From online banking and shopping, to email and social media, it's more important than ever to stake steps that can prevent cyber criminals getting hold of our accounts, data, and devices.
    2. Attacks
      1. In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset.
      2. Hackers
        1. someone who seeks out and exploits these vulnerabilities
          1. A black hat hacker is someone who tries to inflict damage by compromising security systems
            1. A grey hat hacker is someone who does it for fun and not with malicious intent
              1. A white hat hacker is someone who works with organizations to strengthen the security of a system
          2. Types of Threats
            1. Malware
              1. Worm
                1. Worms get around by exploiting vulner
                  1. Types of Malware
                    1. Trojan Horse - Users that are tricked into downloading it to their computer. Once installed the Trojan works, undercover to carry out a predetermined task.
                      1. Rootkit - Designed to remotely access and control a computer system without being detected by security software or the user.
                        1. Ransomware - Encrypts files stored on a computer to extort./demand or steal money from organisations
                          1. Spyware - Is secretly installed to collect information from someone else's computer
                            1. Keyloggers - Spyware that records every keystroke made on a computer to steal personal information
                              1. Social Engineering
                                1. is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.
                                  1. Shoulder Surfing - It involves the attacker watching the victim while they provide sensitive information
                                    1. Phishing - is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.
                            2. Adware - Automatically shows adverts such as popups. Most adware is harmless but some contain spyware such as keyloggers
                              1. Botnet - ots take control of a computer system, without the user’s knowledge. A botnet is a large collection of malware-infected devices (zombies). An attacker (‘bot herder’) chooses when to ‘wake’ the zombies to perform an attack.
                    Show full summary Hide full summary

                    Similar

                    CyberSecurity
                    Stephen Williamson
                    CSS exam
                    Andy Oung
                    cyber security
                    Samuel Melendez
                    Certified Information Systems Security Professional (CISSP)
                    GoAsk Chaz
                    Artificial Intellegence
                    nicky elin
                    Pears of Wisdom - Security Concepts
                    Alex Poiry
                    CSS exam_1
                    Andy Oung
                    Phishing Mindmap Salvy
                    Salvy Ganpatsingh
                    cyber security
                    Jacqui Breeds
                    The Skeletal System - PE GCSE EdExcel
                    naomisargent
                    The Tempest Key Themes
                    Joe Brown