Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 9 - Security and data management, Types of Cybersecurity, Network…
-
Types of Cybersecurity
Malware - short for malicious software, malware is a broad term used to describe software used to disrupt computer operation.
-
Viruses - a computer program that is able to copy itself onto other programs often with the intention of maliciously damaging data. A virus requires an attack vector - 'piggybacking' on another program or data file.
Worms spread from device to device, but unlike a virus they don’t need to attach themselves to other files (attack vectors) - worms can copy themselves hundreds of times, so they can very quickly harm your device and other devices. A worm might copy itself onto your email account and then send a copy to all of your email contacts, for example.
Key loggers - covert programs that capture keyboard (or other input device) input and transmit this data to a third party or hold the data for collection. Onscreen keyboards or Bluetooth keyboards are a method of protection against keyloggers
Spyware. Installed by opening attachments or downloading infected software. Spyware can be used to collect stored data without the user’s knowledge.
Trojans. A Trojan is a program that appears to perform a useful function, but also provides a ‘backdoor’ that enables data to be stolen/damaged.
-
-