security threats and solutions

11mitchellk
Mind Map by , created over 5 years ago

security threats and solutions

28
0
0
Tags
11mitchellk
Created by 11mitchellk over 5 years ago
Weimar Revision
Tom Mitchell
9 History- The Treaty of Versailles
melgallagher
Physics Revision
Tom Mitchell
GCSE AQA Physics - Unit 2
James Jolliffe
Groups Starter Pack
Micheal Heffernan
Biology Revision - Y10 Mock
Tom Mitchell
Coastal Landscapes
Chima Power
Animal Farm Chapter Overview
10jgorman
GCSE - AQA: C1.1 The Fundamental Ideas in Chemistry
Olly Okeniyi
Weimar Germany 1919: The Spartacists and the constitution
Chris Clayton
security threats and solutions
1 a security threat is a potential cause of unwanted incident, which may result in harm to a system
2 security threats are like Errors and Omissions, Fraud and Theft, Employee Sabotage, Loss of Physical and Infrastructure Support, Malicious Hackers, Industrial Espionage, Threats to Personal Privacy.
2.1 Virus: A code segment that replicates by attaching copies of itself to existing executables. The new copy of the virus is executed when a user executes the new host program. The virus may include an additional "payload" that triggers when specific conditions are met. For example, some viruses display a text string on a particular date. There are many types of viruses, including variants, overwriting, resident, stealth, and polymorphic.
2.1.1 Trojan Horse: A program that performs a desired task, but that also includes unexpected (and undesirable) functions. Consider as an example an editing program for a multiuser system. This program could be modified to randomly delete one of the users' files each time they perform a useful function (editing), but the deletions are unexpected and definitely undesired!
2.1.1.1 Worm: A self-replicating program that is self-contained and does not require a host program. The program creates a copy of itself and causes it to execute; no user intervention is required. Worms commonly use network services to propagate to other host systems.
3 diffrent types of threats
3.1 Hacking
3.1.1 Virus
3.1.1.1 Worm
3.1.1.1.1 Trojan Horse
3.1.1.1.1.1 ransome ware
4 ways of protecting yourself from hackers
4.1 short passwordds
4.1.1 long passwords with symbols and capital letters.
4.1.1.1 Phishing
4.1.1.1.1 Firewall
4.1.1.1.1.1 ip up to date.

Media attachments