Chapter 8
- Created by: Rmxs
- Created on: 19-01-20 14:13
View mindmap
- Security Risk
- Hacking
- Illegal access to a computer system
- leads to Identity Theft or gaining personal information
- Data can be deleted, corrupted or changed
- Methods to remove security risk
- Firewall
- Anti-hacking software
- Strong passwords and user ids
- Illegal access to a computer system
- Viruses
- Program or program code that replicates itself.
- Causes the computer to crash ,stop functioning, unresponsive
- Delete files/data
- Corrupt files/data.
- Methods to remove this risk
- Anti-virus Software
- Don't use software from unknown resources.
- Be careful when opening emails and attachments from unknown resources.
- Program or program code that replicates itself.
- Phishing
- Legitimate-looking email sent to the recipient.
- As the recipient click son the link it take them to a fake/bogus website.
- The creator of the email can gain personal data
- Bank account numbers
- Leads to identity fraud.
- Methods to remove this risk
- Use ISPs
- Be cautious when opening emails or attachments.
- Legitimate-looking email sent to the recipient.
- Pharming
- Malicious code installed on a user's hard drive or on the web server.
- The code redirects the user to a fake/bogus website without their knowledge.
- The creator of the code gains personal data
- Bank account numbers
- Leads to fraud or identity theft
- Methods to remove security risk
- Anti-spyware software
- Always be alert to being directed to other websites.
- Malicious code installed on a user's hard drive or on the web server.
- Wardriving
- The act of locating and using wireless internet connections illegally.
- Possible to steal a user's internet time by downloading large files.
- Possible to hack into wireless network and steal a user's password and other personal data.
- Methods to prevent this security risk
- Use of wired equivalent privacy (WEP)
- Complex passwords
- Firewalls
- Spyware/Key - logging software
- Software that gathers information by monitoring key presses on the user's keyboard.
- Gives the originator access to all data entered using a keyboard on the user's computer.
- The software is able to install other spyware. read cookie data and also change a user's default web browser
- Methods to prevent this risk
- Anti-spyware software
- Always be alert
- Use a mouse to select passwords rather than typing them .
- Hacking
Comments
No comments have yet been made