R egisters C ontrol Unit C lock A rithmetic Logic Unit B us
4
New cards
Functions of an OS
S torage allocation P rocessor A pplications M emory I nput/Output devices A ccess rights (security)
5
New cards
Cyber Security threats
W eak /Default Passwords O ut of date software R emovable media (USBs) M isconfigured access rights M alicious code (malware) S ocial Engineering techniques
6
New cards
Social Engineering Techniques
B lagging P hishing P harming S houldering
7
New cards
Malware
V iruses A dware T rojans S pyware
8
New cards
Security Measures
B iometric measures (e.g. mobile devices) E mail confirmations C APTCHA (or similar) A utomatic software updates P assword systems
9
New cards
Networks Security Measures
F irewall A uthentication M AC Address filtering E ncryption
10
New cards
IP layer
A pplication Layer T ransport Layer I nternet Layer L ink layer
11
New cards
TCP / IP layer and protocols
A pplication Layer (HTTP(S), IMAP, SMTP, FTP) T ransport Layer (TCP, UDP) I nternet Layer (IP) L ink Layer (Ethernet, Wi-fi)