Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.6 System Security - Coggle Diagram
1.6 System Security
Forms of attack
Malware
-
-
Symptoms
Files are deleted, corrupted or become encrypted
Computers crash, reboot spontaneously and slow down
-
Keyboard inputs are logged then sent back to the hackers in search for entered passwords and usernames
Phishing
Online fraud technique to entise you to share personal information such as credit card details, usernames, passwords etc.
Symptoms
Accessing a victims account to withdraw money, or purchase goods and services
-
-
-
-
Brute force
Trial and error method which is used by programs to decode encrypted data such as passwords. This is through exhaused effort
-
Protection
-
-
Staff-training: Use strong passwords with symbols, uppercase, lowercase and numbers.
-
Denial of Service
Flooding the server with useless traffic which causes the server to become overloaded preventing them from responding to actual client-server requests.
-
Protection
-
-
-
Good network policy: audits, logs and monitoring
-
SQL Injection
-
Symptoms
Contents of databases can be output, revealing private data
-
-
-
-
Poor Network policy
-
-
Permission to set access servers, files, systems and databases
Network managers who understand, identify and actively protect against vulnerabilities