Blagging - Making up fake scenarios to try and gain sensitive information, Cyber security - The process, methods and technologies which are used to protects out systems, devices and data from damage, unauthorised access and attack, Social engineering - The art of manipulating someone into giving up their personal/sensitive information, Phishing - Using SMS/emails to try and trick people into giving up personal information, Shouldering - Aiming to gain access to sensitive/private data by looking over someone, Cyber security threats e.g. - Weak and default passwords, Out of date software, Removable media, Misconfigured access rights, Malware - Refers to malicious code which is intended to to cause harm or damage/ steal data, Computer virus - Copies itself across a computer/network (activated when use opens the infected file), Adware - Displays unwanted adverts to a user (often in an ‘unclosable window’), Trojans - Disguised as a legit program, when executed, it causes damage to the hard drive/programs, Spyware - Monitors/observes the user’s activity on a computer/network (often used to steal passwords, pins, bank details), How do you detect/prevent cyber threats - Biometric measures, E-mail verification/2FA, CAPTCHA codes, Automatic software updates, Passwords, Regular backup of data, Anti-malware software, Spam filters, Penetration testing - Attempting to gain access to resources without knowledge of login credentials, and other normal means of access. Helps to identify vulnerabilities to make the network/system stronger, Internal penetration test - Simulate a malicious insider who has some knowledge of target system, External penetration test - Simulate an external cyber warfare attack where you have no knowledge of how to access, Pros/Cons internal penetration test - Can be used to target specific vulnerabilities, you know exactly what you are trying to test so better for the company to use, Pros/Cons external penetration test - Trying to discover and find weak spots in the system, requires a lot of investigation/brute force to find issues,
0%
3.6 Cyber security
Share
Share
Share
by
Kyu113
Secondary
KS4
Y10
Computing
Edit Content
Print
Embed
More
Assignments
Leaderboard
Flash cards
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?