Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Threats (Malware (Malicious Software) (Computer Virus, Trojan,…
Network Threats
-
Poor Policy
It is often a good idea to have users sign an 'acceptable use' document so they cannot say they were unaware of the rules
-
Passwords must be hard to guess (many characters, upper and lower case at least).
-
-
-
-
-
-
Social Engineering
-
-
They can be tricked, fooled, bribed, or threatened
-
Denial of service
-
A DoS attack often involves hundreds or thousands of computers which have been infected with botnet malware
-
SQL Injection
When the user inputs their name and password, the system sends an "SQL request"
-
-
Phishing
Sending out e-mails, instant messages, or phone calls pretending to be someone in authority
-
-
Data Interception
In normal operation, data packets passing back and forth between server
The data within each packet, such as passwords or confidential information, is then extracted from the copied packets
-