Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyberspace, Network Security and data transfer (Cyber crime…
Cyberspace, Network Security and data transfer
Cyber crime
Cybersecuritythe collection of technologies processes and practices designed to protect networks, computers, programs and data form attack, damage or unauthorised access
-
Hacking gaining unauthorised access to a computer system with the intention of corrupting or stealing data stored on a hard drive or file server
-
Pornography Used as a way of hiding malware. When an employee downloads adult content they are increasing the risk of an organisations data being corrupted by a virus or stolen by an unauthorised user
-
-
Denial of Service DoS Malicious attack on a network - disturbing connections to s web server, preventing users from logging on to access their data or email accounts be cause access to the internet is denied
-
Cyber Defamation The use of the internet to intentionally damage the reputation of a persons or organisation
Spamming Sending multiple unwanted junk emails such as adverts for products. The inbox becomes overloaded and time is wasted dealing with them
Phishing Sending emails that when opened appear to be from a reliable scource asking the user to upgrade their personal information. This information is then used by hackers for the purpose of identify theft
malware
worms Programs that spread and replicate themselves form computer to computer around a network without the need to be attached to a document or program
Trojan Horsegains entry to a users computer in disguise. the user is tricked into thinking it is a useful piece of software such as anti virus programs .when installed it does serious damage such as delete files
virus a computer program designed to deliberately damage or make a computer system unreliable by slowing down the processor
spyware is secretly installed on a computer from the internet. it records the users actions on the computer secretly
malware a malicious software downloaded onto a computer unintentionally by the internet,email attachments or even by connecting s portable storage device such as a USB storage device
Encryption scrambles data in a computer system using a key before it is transmitted over a network. data is unreadable if it is interceted and only users with the encryption key software can unscramble the data when it arrives at its destination
Passwords a string of characters that only a user should know. it is linked to a specific user ID. Access to the network or computer can only be gained with the correct combination of user ID and Password
levels of access help keep the network secure by controlling the extent a user can use or edit a program or data file. each user is assigned access rights that determine
-
key logger program that records keyboard activities preformed by users. All the keystrokes are saved in a log file and sent over the internet to a person who created the software