network threats
malware
social engineering
Phishing
Brute force
short for malicious software
disrupt computer operations (virus)
secretly monitor what the user is doing (spyware)
most secure websites are vulnerable
mistakes , tricked , fooled or bribed
hundreds of other ways that socila engineering could be used to threat a network
fake e-mails , text messages or phone calls
Denial of Service
guessing passwords
stronger passwords contain things like numbers , and longer passwords
run through passwords
Data interception and theft
This is a method of preventing legitimate users from connecting to a server. Web sites can be blocked with this method.
flood the target server
A DoS attack often involves hundreds or thousands of computers which have been infected with botnet malware
man in the middle attack
passive attack
packets may be intercepted
SQL injection
This is a form of database attack with the aim of getting access to confidential information such as other peoples' login details.
SQL request sends a request to the site
validate your info by validating it
Poor network policy
aimed at helping use the network sensibly
can gain access to your device through links
password guesing
All computers will have password protected screen savers