Cyber Security

Just an initial demo map, so that you don't start with an empty map list ...

Get Started. It's Free
or sign up with your email address
Rocket clouds
Cyber Security by Mind Map: Cyber Security

1. Can you stop your computer from attacking you?

1.1. What are some common myths, and what is the truth behind them?

2. Hoaxes

2.1. A hoax is a deliberately fabricated falsehood made to masquerade as truth. It is distinguishable from errors in observation or judgment, or rumors, urban legends, pseudosciences or April Fools' Day events that are passed along in good faith by believers or as jokes. (Wikipedia)

2.2. How can you tell if the email is a hoax?

2.2.1. Websites that provide information about hoaxes and urban legends: Urban Legends and Folklore - http://urbanlegends.about.com/ Urban Legends Reference Pages - http://www.snopes.com/ TruthOrFiction.com - http://www.truthorfiction.com/ Symantec Security Response Hoaxes - http://www.symantec.com/avcenter/hoax.html McAfee Security Virus Hoaxes - http://home.mcafee.com/VirusInfo/VirusHoaxes.aspx

3. Scams

3.1. A scheme for making money by deceptive, dishonest, or fraudulent means, i.e., a swindle or fraud.

3.2. Social engineering---- the art of manipulating people into performing actions or divulging confidential information.[1] While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.

3.3. Phishing and Pharming

3.3.1. Pretexting, also known in the UK as blagging or bohoing, is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.[4] An elaborate lie, it most often involves some prior research or setup and the use of this information for impersonation (e.g., date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.[5]

3.4. Baiting -- example leaving a DOK

4. Computer Viruses

4.1. Mikko Hypponen: Fighting viruses, defending the net (TED Talk)

4.1.1. I've spent my life defending the Net, and I do feel that if we don't fight online crime, we are running a risk of losing it all. We have to do this globally, and we have to do it right now. What we need is more global, international law enforcement work to find online criminal gangs -- these organized gangs that are making millions out of their attacks. That's much more important than running anti-viruses or running firewalls. What actually matters is actually finding the people behind these attacks, and even more importantly, we have to find the people who are about to become part of this online world of crime, but haven't yet done it. We have to find the people with the skills, but without the opportunities and give them the opportunities to use their skills for good.

4.2. Top Ten Most- Destructive Computer Viruses: 1. Stuxnet ------------ 2,Conficker Virus ------- 3. Agent.btz ------- 4. Zeus ---------5. Poison Ivy ---------- 6. My Doom ----------7. Fizzer ------------- 8. Slammer------------- 9. Code Red-------------10. Love letter/I LOVE YOU

4.3. What can you do if you are infected?

4.3.1. 1. Minimize the damage.

4.3.2. 2. Remove the malicious code

5. Do's and Don'ts

5.1. Safe Passwords

5.2. Use and maintain anti-virus software and a firewall

5.3. Don't use a DOK from computer to computer

5.4. Use Dropbox or other file sharing program

5.5. Use BCC in emails

5.6. Don't hit on ads in sites

5.7. Backup your computer regularly preferable on a external disc

5.8. Use fake facebook and email accounts to sign up for sites

5.9. Regularly scan your computer for spyware

5.10. Check out urbban legands