Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.6 cyberspace, network security and data transfer. (network security…
1.6 cyberspace, network security and data transfer.
cyberspace
-
hacking: gaining unauthorised access to a computer system. with the intention of corrupting or stealing the data stored on a hard drive or file server
network security
denial of service (DOS)-- a malicious attack on a network, for example disrupting connections to a web server, preventing users from logging on to access their data or email accounts because access to the internet is denied
-
digital forgery- intentionally and falsely altering digital content, such as pictures and documents.
cyber defamation- is the use of the internet to intentionally damage the reputation of an individual of organisation
spamming-- is sending multiple unwanted 'junk' emails such as adverts for products. the inbox becomes overloaded and time is wasted dealing with such emails
phishing- sending emails that, when opened appear to be from a reliable source asking for the user to update personal information. this information is then used by hacker for the purpose of identity theft.
malware- malware is malicious software that is downloaded onto a computer unintentionally via the internet or from email attachments, or even by connecting a portable storage device such as a USB storage device
-
virus- a computer program which is designed to deliberately damage or make a computer system unreliable by slowing the processor down
worm-- programs that spread themselves from the computer to computer around a network without the need to be attached to a document or program
key logger-- a program which records keyboard activities performed by users. all the keystrokes are saved in a log file and then sent over the internet to the person who created the software
spyware-- spyware is secretly installed on a users computer from the internet. it record secretly the users actions on the computer
encryption-- encryption scrambles data in a computer system using a 'key' before it is over a network. the data will be unreadable if it is intercepted. only users with the encryption- key software can unscramble the data when it arrives at its destination.