Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 7: Digital Security - Coggle Diagram
Unit 7: Digital Security
Unauthorized Use
Authentication
Login
Encryption
PINs
Passwords
Attacks
Dictionary
Brute Force
Password Managers
Local
USB
Cloud-Based
Password strength
Entropy
Number of characters
Possibilities
Malware
Zero-day attacks
Viruses
Self-replicating
side-loading
rootkit
code injection
Trojans
standalone
droppers
Rootkits
cloaking
Root Privileges
Worms
Internet
File-Sharing
mass-mailing
self-distribution
self-replicating
Antivirus Software
virus signature
heuristic analysis
false positives
Repair
Quarantine
Delete
virus hoax
Online Intrusions
Threats
Backdoors
RATs
Port Scan
Zero-day attacks
Remote Control
Ransomware
Bonets
DDoS
Defenses
Personal Firewall
Anti-exploit software
Netstat
NAT
Interception
Defenses
Digital Certificates
TLS
Secured Wi-Fi
Threats
Spyware
Adware
Keyloggers
Evil Twins
Address Spoofing
Fake Certificates
IMSI Catchers
man-in-the-middle (MITM or MIM)
Social Engineering
Threats
Spam
Pretexting
Phishing
Pharming
Rouge antivirus
PUPs and PUAs
Defenses
anti-malware
CAN-SPAM Act
Inbox management
Spam filters
Safe browsing
SmartScreen filter