Chapter 9: Securing Your System

Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter 9: Securing Your System by Mind Map: Chapter 9: Securing Your System

1. Identify Theft and Hackers

1.1. Hacking

1.1.1. White-hat hackers or ethical hackers

1.1.2. Black-hat hackers

1.1.3. Grey-hat hackers

1.2. Common Types of Cybercrimes

1.2.1. FBI - Related Scams

1.2.2. Identity Theft

1.2.3. Non-auction/Non-Delivery of Merchandise

1.2.4. Advance Fee Fraud

1.3. Types of attack/tools hackers

1.3.1. Packet analyzers (sniffers)

1.3.2. Trojan horses

1.3.3. Backdoor programs and Rootkits

1.3.4. Denial-of-service Attacks (DoS)

1.3.5. Distributed denial-of-service Attack (DDoS)

1.3.6. Botnet

1.3.7. Exploit kits

2. Computer Viruses

2.1. Symptoms of virus infection

2.1.1. Files or app icons disappear

2.1.2. Browser is reset to an unusual home page

2.1.3. Old messages, pop-ups or images are displayed

2.1.4. Data files become corrupt

2.1.5. Programs stop working properly

2.2. List the different categories of Viruses

2.2.1. Boot-sector

2.2.2. Logic bombs and time bombs

2.2.3. Worms

2.2.4. Macros

2.2.5. E-mails

2.2.6. Encryption Viruses

2.2.7. Polymorphic Viruses

2.2.8. Stealth Viruses

3. Online Annoyances and Social Engineering

3.1. Spam

3.1.1. Junk/Unwanted

3.2. Cookies

3.2.1. Privacy violations

3.3. Common Type

3.3.1. Malware

3.3.1.1. Spyware

3.3.1.1.1. Adware

3.4. Social Engineering

3.4.1. Pretexting

3.4.2. Phishing

3.4.3. Pharming

3.4.4. Scareware

4. Restricting Access to Your Digital Assets

4.1. Firewall

4.1.1. Use Packet Filtering

4.1.2. Logical port blocking

4.1.3. Network Address translation (NAT)

4.2. Protection

4.2.1. Antivirus software

4.2.2. Virus signatures

4.2.3. Software Updates

4.3. Authentication: Passwords and Biometrics

4.3.1. Secure Passwords

4.3.1.1. Mixture of upper and lower case letters, numbers and symbols = at least 14 characters

4.3.1.2. Reads a unique personal characteristic

4.3.1.2.1. Fingerprint

4.3.1.2.2. Iris scanners

4.3.1.2.3. Facial recognition software

4.3.2. Anonymously: web surfing

4.3.2.1. Privacy tools

4.3.2.2. USB devices

4.3.2.3. Virtual private network (VPNs)

5. Keeping your Data Safe

5.1. Protecting Information

5.1.1. Social Security number

5.1.2. Phone number

5.1.3. Dare of Birth

5.1.4. Street address

5.2. List the various of backups

5.2.1. Incremental back up

5.2.2. Image back up

5.2.3. Program files

5.2.4. Data files

6. Physical Computing Assets

6.1. 4 main security

6.1.1. keeping them from being stolen

6.1.2. keeping data secure in case they are stolen

6.1.3. Finding a device if it is stolen

6.1.4. Remotely recovering and wiping data off a stolen device

6.2. Software installation

6.2.1. Set off an alarm if the device if moved

6.2.2. help recover the device, if stolen, by reporting the computer's whereabouts when it is connected to the internet

6.2.3. Allow you to lock or wipes the contents of the device remotely