Please enable JavaScript.
Coggle requires JavaScript to display documents.
Preventing vulnerabilities (Intrustion detection system (Untitled…
Preventing vulnerabilities
Intrustion detection system
Forensics
involves capturing, storing, and analysing network events with special software
Who's communicating with who and how
Pentration testing
4 steps: gather information about the target of possible attacks, indefinite possible entry points, attempts to brake in, reports back your findings
Network policies ( helps to prevent)
acceptable use policy
Anti-malware software
protect computers in three ways : prevents harmful programs being installed, prevents files such as os being changed or deleted, detects and removes virus if its has managed to install itself.
Firewalls
Designed to prevent unaurthorised access to or from a private network or intranet
eg . MS has firewall untilities includeed
Passwords
never share your passwords - always strong- capitals and randoms
User acces levels
Read only acess
read write access- for editing
Encryption
Write message, key encrypts it before it transmitted, then transmitted, receivers has a key decrypted message so it can be read
HTTP/S with S is secure