Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Threats (Hacking (Act of gaining unauthorised access to a…
Security Threats
Hacking
-
-
-
-
encryption=not stop hacking, data cannot be read but can still be edited and deleted
CRACKIN is no tsame because cracking is where someone edits the source code of a program so it can be changed for a specific purpose
Phishing
email appears to come from trusted sources e.g. banks/well known service providers. Creator sends this legitimate-looking emails to target users into clicking on hyperlinks in the email which takes the user to a fake website or fools them to give their personal details when replying to email.
-
use ISP/ web browsers which filter emails
be careful when opening emails
don't open attachments ending in .exe,. .bat,. .com. or .php
-
-
Spyware
software gathers data by monitoring key presses on user's keyboard--gathered data is sent back to person
sender gains access to all data entered using keyboard
software can install other spyware, read cookie data and also change a user's default browser
anti-spyware software
be cautious--look out for clues
when entering password, using a pointing device or touch screen to select characters from a drop-down menu can reduce risk
-
Virus
"crash" computer doesn't function user gets the "non responding'' messages
software can delete files
software can corrupt operating system files---compute runs slower/ "crash"
this is a program code/software that can replicate itself with intention of corrupting files on computer--result in computer malfuntion--fill up hard drive
anti-virus software-update regularly
don't use software from unknown sources
be careful when opening emails from unknown senders
Pharming
malicious code installed on a user's computer --code redirects user to a fake website--user doesn't have to take any action unlike phishing
creator gains personal info.
Note: website looks like the real website but is not
leads to fraud/identity theft
use anti-spyware software
be cautious--look out for clues padlock, https
Worms
Same as virus but they can install themselves into computer ( virus is installed when user clicks on attachments/ via USB transfer of data)
-
-
-