Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Security: the practice of protecting digital information from…
Data Security: the practice of protecting digital information from unautherized access, corruption, or theft througout its entire lifecycle
-
Network threats
Spoofing: a users identity is used to obtain confidential or security information or cash & this is done in several ways
Guess the username and password. This makes it easier if the username and password are easy or meaningful to the account holder (such as his name and date of birth).
Sending messages to the targets asking them to update their bank or other data through links that contain pages that are completely similar to the original site, while the data goes to the creator of this page.
The use of hardware or software that records everything that is clicked on the keyboard and sent to a specific e-mail.
Contacting the target directly and claiming that he is an employee of a company or bank and requesting confidential information under the pretext of updating the system or the like.
Eavesdropping
Information is obtained in this way by eavesdropping on data packets as they move through computer networks as in the figure, and this facilitates that these data packets are not encrypted.
Viruses
These are programs developed and written by professional programmers; With the aim of executing certain commands on the victim’s device, such as damaging the computer and its data, or opening ports in the computer through which it can be hacked and monitored. There are types of viruses that can be divided as follows:
Virus: An executive program that aims to achieve specific goals or cause a malfunction in a computer system.
Worm: so, called because it can copy itself and spread quickly through means of communication such as e-mail, with the aim of achieving specific goals.
Trojan Horse: This virus was called the Trojan Horse because it reminds of the famous story of the Trojan Horse, where the Greek soldiers hid inside it and were able to storm the city of Troy and overpower its army. Therefore, this virus is attached to a program without the knowledge of the user and aims to steal data and reveal passwords and bank accounts.
Penetration
Attempting to access the devices and systems of individuals or organizations and companies using special programs through gaps in the protection system with the aim of obtaining information or sabotaging those systems and causing damage to them.
Spyware
A type of hack that is limited to knowing the contents of the target system continuously without harming it.
-
Cryptography terms
Encryption: It is the process of locking up information using cryptography. Information that has been locked this way is encrypted.
-
Key: A secret like a password used to encrypt and decrypt information. There are a few different types of keys used in cryptography.
-
-
-