how hackers brake security system

Get Started. It's Free
or sign up with your email address
how hackers brake security system by Mind Map: how hackers brake security system

1. how they do it

1.1. they do it whit malicious mails, links, pages, they can see your information in social networks ore maybe you share your password with any friend and thy got the mail were you give the information

2. techniques

2.1. intend connections

2.2. malicious mails or links

2.3. use human errors like the sharing of password

2.4. he knows ho he is going to steel and he study him

3. security in the Siemens

3.1. Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against tings that may come via network access, data and code and to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

4. consequences

4.1. lost of information

4.2. lost of money

4.3. lost of personal information like password photos usernames

4.4. lost of familiar security and privacy because wit the information thy have they can steel your credit car or plane a kidnapping because thy know were are you

5. how to prevent them

5.1. Train employees in cyber security principles.

5.2. Install, use and regularly update antivirus and antispyware software on every computer used in your business.

5.3. Use a firewall for your Internet connection.

5.4. Download and install software updates for your operating systems and applications as they become available.

5.5. Make backup copies of important business data and information.

5.6. Control physical access to your computers and network components.

5.7. Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace make sure it is secure and hidden.

5.8. Require individual user accounts for each employee.

5.9. Limit employee access to data and information and limit authority to install software.

5.10. Regularly change passwords.

5.11. don't connect to public connections

5.12. don't open any mail

6. what they do

6.1. cyber attackers use many techniques to access to our system braking the security and thy can steel your user names an password, steel your money and open your credit cards, they have our personal information like pone number pins, make purchases, obtain cash advances, sell your information to people that will use it for illegal tings and send mails whit malware at your name