Contemporaneous Notes - Detailed notes take in real time or immediately after the event. , Autopsy - Open source software used to analyse all times of digital devices. , BYOD - Bring your own device, Chain of Custody - documentation that records the sequence of custody, control, transfer, analysis and location of electronic evidence, Decryption - Process of using a decryption key to make encrypted data readable, Digital device - any electronic device that stores digital data, Disclosure - The legal requirement for the prosecution to tell the defence what evidence on a case. , Data Breach - Unathorised access to and the theft of sensitive data ie customer information intellectual property or employee records. , Phishing - : Cybercriminals use deceptive emails, messages, or links to websites to trick individuals into providing sensitive information ie username, passwords or financial details, Ransomware - malware that encrypts files on a victim’s system, rendering them inaccessible. Cybercriminals then demand a ransom in exchange for the decryption key. then demand a ransom,then demand a ransom, then demand a ransom,, Social Engineering - Cybercriminals manipulate individuals into divulging confidential information or performing actions that compromise security. , Pretexting, baiting or quid pro quo tactics - Types of Social Engineering. , Email compromise - Cyber criminals gain access to email account and use it to impersonate individual to trick people into giving them money, sensitive information etc., Viruses, worms and trojans - Types of Malware, IOT Attack - Cybercriminals exploit vulnerabilities in connected devices to gain unauthorised access to business networks or launch attacks., Encryption - information is converted into a secret code using a mathematical algorithm that makes it unreadable. , Distributed Denial of Service Attack - online services are overwhelmed with traffic. This causes downtime, loss of revenue, damage to company reputation. , Symmetrical encryption - Uses the same key for encryption and decryption. , Types of symmetrical encryption - Advanced Encryption Standard (AES), Data Encryption Standard (DES), Asymmetric encryption - uses a key pair - different key for encryption and decryption. , Types of asymmetric encryption - Elliptic curve cryptography (EEC) Rivest Cipher 4 (RC4), Exploit - Software or data that takes advantage of a vulnerability in a system., Firewall - Network security device that monitors and filters incoming and outgoing network traffic based on a predefined set of rules , Authentication - Process of verifying a users identity ensuring they are who they claim to be., Access control - a way of restricting access to resources based on users roles and permissions, Endpoint Protection - Technologies and strategies for securing devices like laptops, mobile phones and servers that connect to a network., Vulnerability - A weakness of flaw in a system, software or hardware that can be exploited by attackers, Access Control List - a list of rules that grant or deny access to files and/or directories., Data Protection Act 2018 - Controls how your personal information is used, stored and processed by an organisation. , Computer Misuse Act 1990 - Legislation that sets out how to secure computer systems and materials against unathorised access or modification.,
0%
Cyber Security Revision
Condividi
Condividi
Condividi
di
Templetonh
KS4
Computing
Cybersecurity
Modifica contenuto
Stampa
Incorpora
Altro
Compiti
Classifica
Mostra di più
Mostra meno
Questa classifica è privata. Fai clic su
Condividi
per renderla pubblica.
Questa classifica è stata disattivata dal proprietario della risorsa.
Questa classifica è disattivata perché le impostazioni sono diverse da quelle del proprietario della risorsa.
Ripristina le opzioni
Abbinamenti
è un modello a risposta aperta. Non genera punteggi validi per una classifica.
Login necessario
Stile di visualizzazione
Tipi di caratteri
Abbonamento richiesto
Opzioni
Cambia modello
Mostra tutto
Mentre esegui l'attività appariranno altri formati.
Apri risultati
Copia link
Codice QR
Elimina
Ripristinare il titolo salvato automaticamente:
?