1.6 System Security V2 Joshua Guerrero

Descrição

Mapa Mental sobre 1.6 System Security V2 Joshua Guerrero, criado por Joshua G em 21-03-2018.
Joshua G
Mapa Mental por Joshua G, atualizado more than 1 year ago
Joshua G
Criado por Joshua G aproximadamente 6 anos atrás
19
0

Resumo de Recurso

1.6 System Security V2 Joshua Guerrero
  1. Malware
    1. Damage the computer or network
      1. Malware scanner
        1. Anti-Virus
          1. Malware scanner
    2. Viruses
      1. Attaches to a program or a file .This can affect all components of an operating system .
      2. Worms
        1. Replicates itslef and spreads to other computers
          1. Does not need to attach to a file
        2. Social Engineering
          1. This involves someone using data from a program.This does not revolve around technical cra
          2. Data Interperception
            1. When they interact with packets that are going to a certain place
              1. The Packets are encrypted
              2. Network policy
                1. AUP
                  1. aceptable use policy
                2. Brutle force attack
                  1. Trial and error
                    1. This is trying to access based entry system
                      1. An attack that attempts to decode passwords/encryption keys/encrypted data
                    2. DDOS
                      1. Overload a website with unwanted trafic
                        1. Uses a number of computers over a network .To bring the network offline
                      2. SQL
                        1. Where an attacker can execute can execute malicious SQL statements using software which controls a database management system
                          1. When exploits are found they need to be patched
                            1. They get customer data,intellectual property and sensitive information
                        2. Network forensic
                          1. A branch of digital forensics
                            1. Covers the forensic investigations of networks and their devices attached to them
                          2. Ciphertext
                            1. Normal :A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
                              1. Ciphertext:X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
                              2. Firewall
                                1. Advantages
                                  1. Controls network traffic/allows data from authorised
                                    1. Blocks data from unauthorised sources
                                      1. Protects against attackers
                                    2. Strong Passwords
                                      1. At least eight characters
                                        1. Include upper case
                                          1. Include lower case
                                            1. Include special characters
                                              1. Include numbers
                                                1. Does not include a name, company name or user name
                                                  1. Does not contain a complete word

                                                  Semelhante

                                                  NEUROCIÊNCIAS E EDUCAÇÃO
                                                  julioemilio
                                                  Direito Penal - Parte Geral
                                                  Mafalda de Quino
                                                  Português 1 - Sintaxe: Frase, Oração e Período
                                                  wallace.da
                                                  História da informática
                                                  Renato Costa
                                                  Constituição Federal - Artigos 1 à 5
                                                  GoConqr suporte .
                                                  12 dicas para ter uma postura profissional
                                                  Liliane Tubino
                                                  O Clima - Geografia
                                                  GoConqr suporte .
                                                  Funções Trigonométricas
                                                  nathielecosta
                                                  Marketing digital nas redes sociais.
                                                  alexsandro_hitty
                                                  PODER EXECUTIVO I
                                                  Mateus de Souza