Cybersecurity Revision

Description

Mind Map on Cybersecurity Revision, created by lewis dear on 15/03/2021.
lewis dear
Mind Map by lewis dear, updated more than 1 year ago
lewis dear
Created by lewis dear over 4 years ago
17
1
1 2 3 4 5 (0)

Resource summary

Cybersecurity Revision
  1. Cyberattacks
    1. Phishing
      1. definition: sending a afake email or message pretending to be from a bank or organisation, which tricks people into trying to log on to the fake website, stealing their login details
      2. Malware
        1. Ransomware
          1. definition: malware that encrypts users files and demands a ransom to decrypt them
          2. Botnets
            1. definition: a network of computers which contain malware allowing them to be controlled by a hacker
            2. Keyloggers
              1. definition: malware that records every keypress and sends it to a hacker for analysis
              2. Definition: malicious software, designed to cause harm
              3. Attempts to compromise a system or obtain unauthorised digital data (hacking)
              4. Cyber defences
                1. Security Software (antivirus)
                  1. definition: often called antivirus software even though it deals with more than just viruses, scans computers for known malware and removes it. Must be kept up to date with the latest malware definitions
                  2. white hat hacking
                    1. definition: – hacking that is done with the authorisation of the company being hacked. The hacker produces a report of all the vulnerabilities they found, so that the company can fix them
                    2. grey hat hacking
                      1. definition: – hacking done without the authorisation of the company, but with good intentions, often the company will be informed of how the hacker was able to gain access
                      2. backups
                        1. definition: keeping a copy of important data on a different system, so that it can be restored if the original is damaged
                        2. Techniques and systems to reduce the impact of cyberattacks
                        3. Encyption
                          1. Plaintext- the unencrypted data
                            1. Cipher- a method of encrypting text
                              1. Ciphertext- the encrypted data
                                1. Key- some information needed to encrypt/decrypt the data
                                  1. Crack- to read encrypted data without being given the key beforehand
                                    1. Brute force- crack a cipher by trying every possible key until successful
                                      1. Statistical attack- crack a cipher by using statistics and estimates of the most likely values
                                        1. Caesar cipher: a simple cipher, where each letter is shifted a number of places up the alphabet
                                          1. Substitution Cipher- a simple cipher where each letter is replaced by a different letter
                                          Show full summary Hide full summary

                                          4 comments

                                          about 4 years ago
                                          shut up vili its how ni spell it cos im lazey
                                          about 4 years ago
                                          THATS not how u spell lovely ;(
                                          about 4 years ago
                                          lovly lewis
                                          over 4 years ago
                                          e

                                          Similar

                                          Was the Weimar Republic doomed from the start?
                                          Louisa Wania
                                          GCSE Biology Quiz
                                          Andrea Leyden
                                          AQA GCSE Chemistry Unit 2
                                          Gabi Germain
                                          med chem 2 final exam
                                          lola_smily
                                          GCSE Computing: Hardware
                                          Yasmin F
                                          GCSE Biology - Homeostasis and Classification Flashcards
                                          Beth Coiley
                                          1PR101 2.test - Část 14.
                                          Nikola Truong
                                          SFDC App Builder 1 (26-50)
                                          Connie Woolard
                                          Rossetti Links
                                          Mrs Peacock
                                          Data Protection Act 1998
                                          Carina Storm