System Threats

Description

Basics on all six system threats
Lana-Mae Garrett
Mind Map by Lana-Mae Garrett, updated more than 1 year ago
Lana-Mae Garrett
Created by Lana-Mae Garrett almost 7 years ago
9
0

Resource summary

System Threats
  1. Malware
    1. Definition
      1. Effects
        1. Prevention
          1. To prevent malware you can ensure you have strong security software, make sure it is updated to the latest version and back up your files regularly, companies should also make sure to train staff to be cautious of attachments
          2. It may crash, reboot, slow down, slow your internet connection, files may be deleted or corrupted and in some cases can record the keys pressed on your keyboard which would allow the designer to access your information
          3. Malicious Software that is designed to infect a computer and commit crimes like identity fraud
        2. Phishing
          1. Definiton
            1. Disguising as a trusted entity like an email in order to gain personal information- software identity fraud
            2. Effects
              1. Money can be taken out or spent, new accounts can be opened, access to data is gained and companies may be blacklisted which can damage reputation
              2. Prevention
                1. Strong security software, disable pop ups,be cautious of fake websites and emails and to never disclose personal or financial information
              3. Brute Force Attack
                1. Effects
                  1. An exhaustive rather than intellectual trial and error in order to decode encrypted data
                  2. Prevention
                    1. Definition
                    Show full summary Hide full summary

                    Similar

                    A level Computing Quiz
                    Zacchaeus Snape
                    Types and Components of Computer Systems
                    Jess Peason
                    Input Devices
                    Jess Peason
                    Output Devices
                    Jess Peason
                    Software Processes
                    Nurul Aiman Abdu
                    Computing
                    Kwame Oteng-Adusei
                    Software testing strategies: Summary
                    harrymt
                    Software Application
                    Dim Ah
                    Pack of playing cards answer
                    Karl Taylor
                    Code Challenge Flow Chart
                    Charlotte Hilton