Component 3 Learning Aim B Revision Mind Maps
Component 3 Learning Aim B Revision Mind Maps Threats to digital systems and how an organisation can manage them.
Key Terms • Intellectual Property • Ransomware • Malware • Denial-of-Service (Do. S) attacks • Cybersecurity An external attack is … • • • Impacts of security breach Immediate Impact External attack methods include: • Longer-term Impact Internal security threats: Reasons why systems are attacked • • An internal attack is … Key Terms • Social Engineering • Phishing • Pharming • Productivity
Permitted access means… Examples of physical security measures: Benefits Drawbacks Passwords are … • Passwords can take several different forms, such as: • • • Benefits Drawbacks Examples of biometric security measures: • • What are biometrics? • • How does 2 factor authentication work? Benefits Drawbacks
Key Terms: • Firewall • Local Area Network (LAN) • Access Control List (ACL) • Shoulder Surfing • Session Cookies • Worms • Trojans • Rootkit • Spyware A firewall is … A software firewall… A hardware firewall… Benefits of firewalls Drawbacks of firewalls What is malware? Anti-virus software is … • • Different types of malware: Disadvantages Common techniques used to make applications easier to use Advantage? Most websites obscure data entry Avoids the need to remember passwords • • Advantages Some sites allow the user to stay logged in BUT…
Key Terms: • Vulnerable • Security patches • Privilege Ethical hacking is … What is device hardening? • Examples of device hardening techniques: Steps of penetration testing: • Benefits of ‘pen’ testing • Drawbacks of ‘pen’ testing • • Encryption is … • Encryption algorithm + key Advantages Disadvantages
Why are disaster recovery policies created? Types of disaster Considerations when writing a disaster recovery policy: • • Dos and Don’ts for password creation Examples of security policies: • • • Password Strength? What is an AUP? What are the risks of installing and using unapproved software? Examples PASSWORD, 123456 Liver. Pool 5 A? v. Er 8 g. S! Actions to take after attack: 1. 2. 3. 4. 5.
- Slides: 6