Please enable JavaScript.
Coggle requires JavaScript to display documents.
(Malware (Malware comes from two words: (Malicious – to cause an act of…
Malware
-
-
-
Ransomware
-
If the data is encrypted, not even
a cyber security professional professional will
be able to recover the data unless
backups are available
-
Rootkit
In UNIX, Linux and MacOS computers, the user account that has full access to the computer is known as ‘root’
-
-
-
Botnet
-
In a botnet, a hacker will first infect
machines to make zombie devices
-
-
-
Hacking
-
-
Example
In 2002, Gary McKinnon, from Glasgow, hacked into
US military and NASA computers
-
-
-
-
Phishing
-
Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website
-
-
Denial of Service
In a denial of service attack, a hacker will use or
infect a computer so that:
-
-
In a distributed denial of
service attack (DDoS), many computers are used
to send the requests
-
-
-
-