security threats

Description

Year 9 Computing Mind Map on security threats, created by jacob stenning on 15/05/2017.
jacob stenning
Mind Map by jacob stenning, updated more than 1 year ago
jacob stenning
Created by jacob stenning almost 7 years ago
42
1

Resource summary

security threats
  1. MALWARE
    1. Malware—software written to infect computers and commit crimes such as fraud and identity theft
      1. By exploiting vulnerabilities in operating systems and browsers, malware can sneak malicious Trojan horse programs onto unsecured PCs. Unsuspecting and unprotected users can also download Trojans, thinking they are legitimate game, music player, movie, and greeting card files.
        1. effects of malware- Malware causes your connection to slow down Malware causes your computer to slow down; badly written code can cause your computer to crash. Malware can cause your computer to display error messages continually. Malware could cause your computer to be incapable of shutting down or restarting as it keeps certain processes active.
        2. PHISHING
          1. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
            1. effects include--Theft of identity and users' confidential details. This could result in financial losses for users and even prevent them from accessing their own accounts. Loss of productivity. Excessive resource consumption on corporate networks (bandwidth, saturated email systems, etc.).
            2. BRUTE FORCE ATTACK
              1. Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
                1. effects of a brute force attack include--access to bank details,access to social media, being logged out of accounts and anything inside yourcompuet such as files
                2. DENIAL OF SERVICE
                  1. an interruption in an authorized user's access to a computer network, typically one caused with malicious intent.
                    1. A Denial of Service (DoS) attack happens when a service that would usually work becomes unavailable. ... The Denial of Service attacks that we will be discussing today are called Distributed Denial of Service (DDoS), which result from a large number of systems maliciously attacking one target.
                    2. DATA INTERCEPTION
                      1. When packets travel across a network, they are susceptible to being read, altered, or “hijacked.” Hijacking occurs when a hostile party intercepts a network traffic session and poses as one of the session endpoints. An attacker monitors data streams to or from a target, in order to gather sensitive information.
                        1. EFFECTS--they can access what ever data your tranferring
                        2. SQL INJECTION
                          1. SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application's database server (also commonly referred to as a Relational Database Management System – RDBMS).
                            1. SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. SQL Injection is very common with PHP and ASP applications due to the prevalence of older functional interfaces. Due to the nature of programmatic interfaces available, J2EE and ASP.NET applications are less likely to have easily exploited SQL injections. The severity of SQL Injection attacks is limited by the attacker’s skill and imagination, and to a lesser extent, defense in depth countermeasures, such as low privilege connections to the database server and so on. In general, consider SQL Injection a high impact seve

                            Media attachments

                            Show full summary Hide full summary

                            Similar

                            A level Computing Quiz
                            Zacchaeus Snape
                            Types and Components of Computer Systems
                            Jess Peason
                            Input Devices
                            Jess Peason
                            Output Devices
                            Jess Peason
                            Computing
                            Kwame Oteng-Adusei
                            Pack of playing cards answer
                            Karl Taylor
                            Code Challenge Flow Chart
                            Charlotte Hilton
                            System Threats
                            Ella Fisher Scott
                            Hacking quiz
                            Luigi3106 YT
                            System Threats
                            Lana-Mae Garrett
                            Computing Hardware - CPU and Memory
                            ollietablet123