Chapter 8

?
  • Created by: Rmxs
  • Created on: 19-01-20 14:13
View mindmap
  • Security Risk
    • Hacking
      • Illegal access to a computer system
        • leads to Identity Theft or gaining personal information
        • Data can be deleted, corrupted or changed
        • Methods to remove security risk
          • Firewall
          • Anti-hacking software
          • Strong passwords and user ids
    • Viruses
      • Program or program code that replicates itself.
        • Causes the computer to crash ,stop functioning, unresponsive
        • Delete files/data
        • Corrupt files/data.
      • Methods to remove this risk
        • Anti-virus Software
        • Don't use software from unknown resources.
        • Be careful when opening emails and attachments from unknown resources.
    • Phishing
      • Legitimate-looking email sent to the recipient.
        • As the recipient click son the link it take them to a fake/bogus website.
      • The creator of the email can gain personal data
        • Bank account numbers
      • Leads to identity fraud.
      • Methods to remove this risk
        • Use ISPs
        • Be cautious when opening emails or attachments.
    • Pharming
      • Malicious code installed on a user's hard drive or on the web server.
        • The code redirects the user to a fake/bogus website without their knowledge.
      • The creator of the code gains personal data
        • Bank account numbers
      • Leads to fraud or identity theft
      • Methods to remove security risk
        • Anti-spyware software
        • Always be alert to being directed to other websites.
    • Wardriving
      • The act of locating and using wireless internet connections illegally.
      • Possible to steal a user's internet time by downloading large files.
      • Possible to hack into wireless network and steal a user's password and other personal data.
      • Methods to prevent this security risk
        • Use of wired equivalent privacy (WEP)
        • Complex passwords
        • Firewalls
    • Spyware/Key  - logging software
      • Software that gathers information by monitoring key presses on the user's keyboard.
      • Gives the originator access to all data entered using a keyboard on the user's computer.
      • The software is able to install other spyware. read cookie data and also change a user's default web browser
      • Methods to prevent this risk
        • Anti-spyware software
        • Always be alert
        • Use a mouse to select passwords rather than typing them .

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Chapter 8 security risks resources »