null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
12931978
1.6 System Security V2 Joshua Guerrero
Descrição
Mapa Mental sobre 1.6 System Security V2 Joshua Guerrero, criado por Joshua G em 21-03-2018.
Sem etiquetas
gcse
Mapa Mental por
Joshua G
, atualizado more than 1 year ago
Mais
Menos
Criado por
Joshua G
aproximadamente 6 anos atrás
19
0
0
Resumo de Recurso
1.6 System Security V2 Joshua Guerrero
Malware
Damage the computer or network
Malware scanner
Anti-Virus
Malware scanner
Viruses
Attaches to a program or a file .This can affect all components of an operating system .
Worms
Replicates itslef and spreads to other computers
Does not need to attach to a file
Social Engineering
This involves someone using data from a program.This does not revolve around technical cra
Data Interperception
When they interact with packets that are going to a certain place
The Packets are encrypted
Network policy
AUP
aceptable use policy
Brutle force attack
Trial and error
This is trying to access based entry system
An attack that attempts to decode passwords/encryption keys/encrypted data
DDOS
Overload a website with unwanted trafic
Uses a number of computers over a network .To bring the network offline
SQL
Where an attacker can execute can execute malicious SQL statements using software which controls a database management system
When exploits are found they need to be patched
They get customer data,intellectual property and sensitive information
Network forensic
A branch of digital forensics
Covers the forensic investigations of networks and their devices attached to them
Ciphertext
Normal :A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ciphertext:X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Firewall
Advantages
Controls network traffic/allows data from authorised
Blocks data from unauthorised sources
Protects against attackers
Strong Passwords
At least eight characters
Include upper case
Include lower case
Include special characters
Include numbers
Does not include a name, company name or user name
Does not contain a complete word
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
NEUROCIÊNCIAS E EDUCAÇÃO
julioemilio
Direito Penal - Parte Geral
Mafalda de Quino
Português 1 - Sintaxe: Frase, Oração e Período
wallace.da
História da informática
Renato Costa
Constituição Federal - Artigos 1 à 5
GoConqr suporte .
TSE
Tenylle Viana
12 dicas para ter uma postura profissional
Liliane Tubino
O Clima - Geografia
GoConqr suporte .
Funções Trigonométricas
nathielecosta
Marketing digital nas redes sociais.
alexsandro_hitty
PODER EXECUTIVO I
Mateus de Souza
Explore a Biblioteca