Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyberspace, network security and data Transfer - Coggle Diagram
Cyberspace, network security and data Transfer
Cyber Crimes
Denial of Service- A malicious attack on a network, e.g. preventing users from logging in to access data or email accounts
-
Data Theft- This is the theft of personal data, which is then used to commit identity fraud
-
-
-
Pornography- Often used as means of hiding malware if someone downloads adult content they are at increasing risk that they have downloaded malware
Phishing- Sending emails from what appears to be a reliable source: these emails often ask the recipient to update their personal info by clicking on a hyperlink that opens up a web page: this info is then used by hackers for identity theft
Hacking- Gaining unauthorised access to a computer with the intention of corrupting or stealing data off a hard drive
Malware- Malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachments
-
-
-
Spyware
Software that is secretly installed on a user’s computer from the internet and its purpose is to track the users activities e.g. credit card and password details
Virus
-
-
Can enter network through browsing the internet, opening email attachments or via a USB storage device
Network Protection
Access Levels
-
Access rights include ‘read only’ ‘read and copy’ and ‘read and write’. The access rights are stored in a table linked to ID and password
-
Usernames and Password
-
-
Users are allocated a unique user ID and a randomly generated password. This password must be changed regularly by the network software to enhance security
-
-
-