Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network security (Hacking: (Any attempt to gain unauthorised access to a…
Network security
-
Security Policies:
-
Policies need to be simple, well understood and updated as necessary.
-
-
Network Forensics:
-
-
After network is attacked these packets can be analysed to discover how the network was attacks to prevent it happening in the future.
Passwords:
-
Passwords should be strong – many characters, letters, numbers and symbols.
-
Encryption:
Data is translated into a code which only someone with the correct key can access – unauthorised users can’t access it.
Encrypted text is called cipher text, whereas non-encrypted data is called plain text.
-
Penetration testing:
-
Pentesting is used to identify possible weaknesses in a network’s security by trying to exploit them.
User access Levels:
Helps to limit the number of people with access to important data, helps prevent insider attacks on the networks
-