Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity Basics - Coggle Diagram
Cybersecurity Basics
-
-
computers, they all can produce similar symptoms. Computers that are
-
-
-
-
-
-
Appearance of strange files, programs, or desktop icons
Programs running, turning off, or reconfiguring themselves (malware will
-
-
-
-
-
Install and run anti-malware, anti-virus, or firewall software. When
selecting software, choose a program that offers tools for
detecting, quarantining, and removing multiple types of malware.
At the minimum, anti-malware software should protect against
viruses, spyware, adware, Trojans, and worms. The combination of
-
-
-
-
-
-
Be vigilant when downloading files, programs, attachments, etc.
-
-
-
-
without any human interaction, and it does not need to attach itself to a
-
Once opened, these files could provide a link to a malicious website or
automatically download the computer worm. Once it’s installed, the worm
-
Worms can modify and delete files, and they can even inject additional
-
-
resources, such as hard drive space or bandwidth, by overloading a shared
network. In addition to wreaking havoc on a computer’s resources, worms
can also steal data, install a backdoor, and allow a hacker to gain control
-
-
Eventually, your birth-date can be matched with your name found on
-
-
postcode, PPS numbers, and mother’s maiden name) from these
-
Reveal your birth-date on site A, your relatives on site B (which gives
for example mother’s maiden name), your address on site C and
-
-
-
That information can then be used to hack things, either directly using
password reset forms, guessing passwords, etc, or indirectly through
-
To put it simply, if cybercriminals use malware and viruses to
hack our computers, then social engineering is how they hack
-
In computing, social engineering refers to the methods
-
questionable action, often involving a breach of security, the
sending of money, or giving up private information. These
-
common sense. However, by manipulating our emotions—both
good and bad—like anger, fear, and love, scammers can get us
-
-
Spyware
It gathers information about you, including the sites you visit, the
things you download, your usernames and passwords, payment
information, and the emails you send and receive.
-
permission, attaching itself to your operating system. You might
-
-
-
Whatever way spyware manages to get on your PC, the method of
operation is generally the same—it runs quietly in the background,
-
-
-
hacker. Well, you are wrong. A single user is likely to have entered
-
For example, a person might have entered this tiny piece of
information to sign up for different newsletters, on social media sites
like Facebook/Reddit, on online video streaming websites and even
-
questions. Together, this information is pretty much everything a
-
-
-
-
common medium for spam is email, but it is not uncommon for spammers to
use instant messages, texting, blogs, web forums, search engines, and social
-
While spam is not actually a type of malware, it is very common for malware
-
with viruses, worms, or other malware are used to distribute spam messages
-
-
-
A firewall, at its most basic level, permits or denies
communications between computers, between
networks, or between computers and networks (for
example, your home computer and the Internet)
-
-
-
-
-
-
-
-
extremely “popular” in the ‘90s, which is when the term
“Anti-virus” became common, but today viruses are the minority
-
threats like viruses, worms, and trojans, but also offers
protection against adware, bots, and other exploits.
-
-
Bugs
-
-
-
-
-
-
bypass user authentication, override access privileges, or steal data. Bugs can
be prevented with developer education, quality control, and code analysis
-
Trojan Horse
In Virgil’s epic poem, The Aeneid, a clever Greek war strategist
-
of Troy. Instead of destroying or climbing the city’s walls, Odysseus
-
Greeks appear to sail away, leaving behind a giant wooden horse as
a token of surrender. Drunk on victory, the Trojans bring the horse
inside their walls, only to discover Odysseus and his men were
-
Like its namesake, Trojan horse attacks, or simply “Trojans” use
-
-
Think of Trojans as an umbrella term for malware delivery, because
-
programmer’s intent, a Trojan can be like a Swiss Army knife of
hacking—acting as a bit of standalone malware, or as a tool for
other activities, such as delivering future payloads, communicating
with the hacker at a later time, or opening up the system to attacks
-
Adware
-
your screen, most often within a web browser. Some security
-
(potentially unwanted program). Typically, it uses an
underhanded method to either disguise itself as legitimate, or
-
your PC, tablet, or mobile device.
-
What is a bot?
Short for Robot, are small apps that perform automated tasks
-
-
-
app, a bot may answer your question.
-
You’ll find chatbots in instant messaging apps, private
chat groups, and Facebook. Chatbots answer questions
from users. When a user asks a question, the Chatbot
-
Rootkits
A rootkit is a collection of computer software, typically
malicious, designed to enable access to a computer or an
-
-
-
-
-
-
-
-
-
in 1982 for the Apple II, and other versions quickly followed.
-
-
protect you against all manner of malware, but common viruses
-
-
-
What is Malware?
Malware,or malicious software,is any program or file that is harmful to a computer user.