Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security (preventions and resistances (time bombs: viruses…
Information Security
preventions and resistances
time bombs: viruses wait for signal before doing what they were told
content filtering: filters content for unauthorized information
encryption: codes information that requires a password to decrypt
firewall: guard private networks by watching what is coming in and going out
antivirus software: scans and searches hard drives
virus: software written to cause damage
backdoor programs: open way for attacks in the future
denial-of-service: overwhelms a website with request that makes it slow down or crashes
distributed denial-of-service: same thing but from multiple computers
polymorphic or worms: change forms as they spread
social engineering: hackers trick people into giving out information
Hackers are experts in technology who know how to break into computers
drive-by hacking: attack were the hacker doesn't have to be inside the office
trojan-horse: hides inside other softwares
worms: spread itself and change their forms
Adware: advertisements display on website without consent of the computer user
spyware: collects data about the user and spreads it over the internet without permission
two lines of security defense: people and technology
dumpster diving: hackers look through your trash
identity theft: forging the identity of someone to create fraud
phishing: get personal information from emails
vishing: phone scam where hackers get someone to call and verify information
pharming: redirects people to false sites
zombie: computer secretly takes over anther computer for launching attacks
zombie farm: group of computers that have zombie programs
pharming attack: zombie farm to create large phasing attack