Please enable JavaScript.
Coggle requires JavaScript to display documents.
GCSE ICT- Cyber Security and Malware - Coggle Diagram
GCSE ICT- Cyber Security and Malware
Impact of cyber attacks
When the hacker changes your data- Data Modification
What is Cyber security?
Cyber Security:: Combination of using policies, procedures and technology to keep our devices secure from internal and external threats
Malware
Malware:: Code or File that can be transferred over a network that infects, conducts, explores and exploits the device in any way the hacker wants to do
Viruses:: Piece of code that is intended to harm you device but needs the user's access to spread to other devices
Social Engineering
Social Engineering:: The tactics/strategies of accessing, destroying, manipulating and taking data
Baiting:: Contacting the user to try and access personal details in exchange for a tempting offer
Phishing:: Emailing the user links convincing them to give away personal details
Blagging/Pretexting:: Calling the victim and making up pointless/unrealistic scenarios to try and make them give away personal details
Worms:: Piece of code intended to harm the device but can spread without the user's interaction
Trojan Horse:: Something that appears to be normal but turns out is a piece of malicious software
Ransomware:: When a hacker steals/encrypts files and wants money in return for you to gain access back
Quid Pro Quo:: Contacting the user to gain information for something. Something for something. This could include a free anti-virus service
Shoulder Surfing:: Spying on the victim IRL to gain personal bank details
When the hacker steals data with the intent of causing fraud- Identity Fraud
When the hacker destroys your data- Data Destruction
When the hacker tweaks and slightly messes with you data- Data Manipulation
When the hacker steals personal details- Data Theft
A DoSA overruns the files and locks the user out of their accounts refusing access to details- Denial of Service