Contemporaneous Notes - Detailed notes take in real time or immediately after the event. , Autopsy - Open source software used to analyse all times of digital devices. , BYOD - Bring your own device, Chain of Custody - documentation that records the sequence of custody, control, transfer, analysis and location of electronic evidence, Decryption - Process of using a decryption key to make encrypted data readable, Digital device - any electronic device that stores digital data, Disclosure - The legal requirement for the prosecution to tell the defence what evidence on a case. , Data Breach - Unathorised access to and the theft of sensitive data ie customer information intellectual property or employee records. , Phishing - : Cybercriminals use deceptive emails, messages, or links to websites to trick individuals into providing sensitive information ie username, passwords or financial details, Ransomware - malware that encrypts files on a victim’s system, rendering them inaccessible. Cybercriminals then demand a ransom in exchange for the decryption key. then demand a ransom,then demand a ransom, then demand a ransom,, Social Engineering - Cybercriminals manipulate individuals into divulging confidential information or performing actions that compromise security. , Pretexting, baiting or quid pro quo tactics - Types of Social Engineering. , Email compromise - Cyber criminals gain access to email account and use it to impersonate individual to trick people into giving them money, sensitive information etc., Viruses, worms and trojans - Types of Malware, IOT Attack - Cybercriminals exploit vulnerabilities in connected devices to gain unauthorised access to business networks or launch attacks., Encryption - information is converted into a secret code using a mathematical algorithm that makes it unreadable. , Distributed Denial of Service Attack - online services are overwhelmed with traffic. This causes downtime, loss of revenue, damage to company reputation. , Symmetrical encryption - Uses the same key for encryption and decryption. , Types of symmetrical encryption - Advanced Encryption Standard (AES), Data Encryption Standard (DES), Asymmetric encryption - uses a key pair - different key for encryption and decryption. , Types of asymmetric encryption - Elliptic curve cryptography (EEC) Rivest Cipher 4 (RC4), Exploit - Software or data that takes advantage of a vulnerability in a system., Firewall - Network security device that monitors and filters incoming and outgoing network traffic based on a predefined set of rules , Authentication - Process of verifying a users identity ensuring they are who they claim to be., Access control - a way of restricting access to resources based on users roles and permissions, Endpoint Protection - Technologies and strategies for securing devices like laptops, mobile phones and servers that connect to a network., Vulnerability - A weakness of flaw in a system, software or hardware that can be exploited by attackers, Access Control List - a list of rules that grant or deny access to files and/or directories., Data Protection Act 2018 - Controls how your personal information is used, stored and processed by an organisation. , Computer Misuse Act 1990 - Legislation that sets out how to secure computer systems and materials against unathorised access or modification.,
0%
Cyber Security Revision
Share
Share
Share
by
Templetonh
KS4
Computing
Cybersecurity
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?