Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data (malware (adware (automatically delivers adverts and pop ups to…
Data
malware
-
-
bot
Bots are software programs designed to perform a specific function. Used in botnets and DDOS attacks., these can be any device and regularly computers are infected and become a bot without the users knowledge.
ransomware
takes over a computer, locks the user out a demands a ransom to release it, this is also done with stolen data.
trojan horse
disguises itself as a normal file to trick someone into downloading it but is actually malware that will damage the computer or download virus's
-
virus
A form of malware that copy's itself and attaches itself to files and spreads to other computers. can be used to steal information, make botnets, steal money and harm host computers or networks.
worm
spread over computer networks by exploiting vulnerabilities, causes harm by overloading web servers and consuming bandwidth can create a payload which can :steal data, delete files, or create botnets
spyware
spy's on user activity without the users knowledge or consent, can track passwords and usernames so things can be stolen.
data collection
-
-
questionnaire
A hard copy questionnaire is handed round door to door or otherwise in person then collected when it is filled in. Also a online survey distributed by email or found on a website.
-
-
-
-
social engineering
pretexting
a hacker uses a pretext, e.g pretends to be a bank manager to trick someone to giving out personal information
-
-
-
tailgating
following an authorised person through security as to gain access to a restricted area e.g follow someone through a door.
shouldersurfing
when someone observes someone else eneter sensitive data, taking from looking over someones shoulder while they enter a pin at a cash machine
weaknesses
natural
earthquakes fires, tsunami's and other disasters could cause servers t be damaged or destroyed and the area where the data is kept could be destroyed. Security could be knocked out and leave the system vulnerable or the building could collspe we
here the data is stored.
weak passwords
easily guessed allowing hackers to access destroy or change important work, personal information could be leaked or passwords changed locking you out of your account, someone else could masquerade as you and if you use the same or similar passwords for other accounts those too could b compromised
physical
thieves could break in and steal data in physical form or copy it, people posing as workers could also steal sensitive information from the company.
insecure modems
modems can be used to bypass firewalls and spread virus's. modems connect computers so they can communicate.
-
hacking
-
grey hat
a grey hat hacker will neither exploit or report the bug, they may post it on a forum or tell other hackers about it. they may hire someone else to exploit the bug for them but will not do it themselves.
white hat
a whit hat hack when he/she finds a bug or exploit reports it the owner of the code e.g a website for not personal gin.
-
data and information.
information is data in a format usable by humans, humans can understand information as it is data processed and in a human context e.g statistics about most popular purchases.
-
botnet
a bot net is when a large amount of computers are infected by a hacker and become bots. A bot is a infected computer that a hacker can use to perform DDOS attacks for example, a hacker has full control over this computer.
DDOS
distributed denial of service is where a website is bombarded so much information or requests that it shuts down or cannot process true requests.
-
-
-
-
pharming is when a website is set up and traffic is redirected from the real one to this website to spread viruses or have users enter information like credit card details.
-
-