STRATEGIES FOR DETECTING/PREVENTING NETWORK SECURITY THREATS (Firewall (A…
STRATEGIES FOR DETECTING/PREVENTING NETWORK SECURITY THREATS
How to protect passwords
Two factor authentication- when it requires two things in order for the user to gain access to their account
Protecting password files
Keeping confidential things (such as passwords) hidden or locked
Password complexity- using a range of numbers and digits too make it harder to guess
Counter on amount of times password is guessed, will reduce the risk of brute forces working as they will only have a certain amount of guesses
Instead of something simple like 1234
Threats to passwords:
Phishing- when a password is typed into a fake website an then sent to another user.
Brute force- trying every single combination of numbers and letters
Reuse of a known pasword
a computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites.
A CAPTCHA is used to separate humans and machines.
It is normally an image test or a simple mathematics problem which a human can read or solve, but a computer cannot.
It is made to stop computer hackers from using a program to automatically set up hundreds of accounts, such as email accounts.
Confrimation email adress/sms
Confirmation messages are used as a two-factor authenticationdevice to ensure that the user logging into theaccount is the same as the user who owns the account.
When first signing up to a website(etc.) a user may be asked for an email address or phone number
This means that is someone else logs on they will require a code that would of been sent to the owner of the account and therefore the user cannot get onto the account without the pin/link that has been sent.
Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely difficult for someone to break into a system.
For example on many phones, tablets and other devices biometric security uis used as a password
For example on iPhones past the iPhone 5, there are fingerprint scanners in the home button which offers the option to unlock your phone by simply scanning your finger
All fingerprints are unique so it offers a safe way to lock your phone
User access rights
The permissions that are granted to a user, or to an application, to read, write and erase files in the computer.
Access rights can be tied to a particular client or server, to folders within that machine or to specific programs and data files.
Part of an access control for computer systems allows a system administrator to set up a section only accessible to certain users.
This means that the other users can access only a limited set of information.
A firewall sets the rules for how data packets can enter or leave the network.
Firewalls can be a hardware appliance or software running on the local computer
Firewalls bock certain access points and network addresses
A firewall may also block Denial of Service attacks as if there are many requests from the same area, a firewall may see it as being dodgy and block it to prevent any attack
Can also prevent malware from leaking data back out if the network if it manages to get in
Scans computer for threats and viruses
Must be regularly updated
It can prevent access to computer systems by unwanted computer malwares. Viruses, worms or Trojan Horses can be used by criminals or mischievous people (called 'hackers'). They can be used to steal information or damage system files. If no antivirus software is installed, hackers may be able to access the information in the computer.
There are many different types of antivirus software. Many antivirus programs can be downloaded for free. These versions usually have some features missing.
Encryption allows information to be hidden so that it cannot be read without special knowledge (such as a password). This is done with a secret code or cypher. The hidden information is said to be encrypted.
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on.