Blagging - Making up fake scenarios to try and gain sensitive information, Cyber security - The process, methods and technologies which are used to protects out systems, devices and data from damage, unauthorised access and attack, Social engineering - The art of manipulating someone into giving up their personal/sensitive information, Phishing - Using SMS/emails to try and trick people into giving up personal information, Shouldering - Aiming to gain access to sensitive/private data by looking over someone, Cyber security threats e.g. - Weak and default passwords, Out of date software, Removable media, Misconfigured access rights, Malware - Refers to malicious code which is intended to to cause harm or damage/ steal data, Computer virus - Copies itself across a computer/network (activated when use opens the infected file), Adware - Displays unwanted adverts to a user (often in an ‘unclosable window’), Trojans - Disguised as a legit program, when executed, it causes damage to the hard drive/programs, Spyware - Monitors/observes the user’s activity on a computer/network (often used to steal passwords, pins, bank details), How do you detect/prevent cyber threats - Biometric measures, E-mail verification/2FA, CAPTCHA codes, Automatic software updates, Passwords, Regular backup of data, Anti-malware software, Spam filters, Penetration testing - Attempting to gain access to resources without knowledge of login credentials, and other normal means of access. Helps to identify vulnerabilities to make the network/system stronger, Internal penetration test - Simulate a malicious insider who has some knowledge of target system, External penetration test - Simulate an external cyber warfare attack where you have no knowledge of how to access, Pros/Cons internal penetration test - Can be used to target specific vulnerabilities, you know exactly what you are trying to test so better for the company to use, Pros/Cons external penetration test - Trying to discover and find weak spots in the system, requires a lot of investigation/brute force to find issues,
0%
3.6 Cyber security
Condividi
Condividi
Condividi
di
Kyu113
Secondary
KS4
Y10
Computing
Modifica contenuto
Stampa
Incorpora
Altro
Compiti
Classifica
Flash card
è un modello a risposta aperta. Non genera punteggi validi per una classifica.
Login necessario
Stile di visualizzazione
Tipi di caratteri
Abbonamento richiesto
Opzioni
Cambia modello
Mostra tutto
Mentre esegui l'attività appariranno altri formati.
Apri risultati
Copia link
Codice QR
Elimina
Ripristinare il titolo salvato automaticamente:
?