network threats

malware

social engineering

Phishing

Brute force

short for malicious software

disrupt computer operations (virus)

secretly monitor what the user is doing (spyware)

most secure websites are vulnerable

mistakes , tricked , fooled or bribed

hundreds of other ways that socila engineering could be used to threat a network

fake e-mails , text messages or phone calls

Denial of Service

guessing passwords

stronger passwords contain things like numbers , and longer passwords

run through passwords

Data interception and theft

This is a method of preventing legitimate users from connecting to a server. Web sites can be blocked with this method.

flood the target server

A DoS attack often involves hundreds or thousands of computers which have been infected with botnet malware

man in the middle attack

passive attack

packets may be intercepted

SQL injection

This is a form of database attack with the aim of getting access to confidential information such as other peoples' login details.

SQL request sends a request to the site

validate your info by validating it

Poor network policy

aimed at helping use the network sensibly

can gain access to your device through links

password guesing

All computers will have password protected screen savers