Please enable JavaScript.
Coggle requires JavaScript to display documents.
network threats (denial of service (overloading traffic flow, flooding…
network threats
-
social engineering
-
honing up a user at work and convincing them to break policy and give them the information they want directly
-
-
phishing
First of all you are made aware that there is an urgent problem of some kind. For example Your bank account is suspended or Your internet connection is to be terminated.
Then they suggest a simple way to resolve the problem. For example, 'click on this link' or 'phone this support number'.
-
Here is an example of a typical phishing email. Take a look at it and see how many features you can spot which would alert you:
-
-
slq injection
With SQL injection, the attacker tries to insert extra SQL commands into the input boxes, hoping that these commands will be carried out by the server
-
brute force
Brute force attacks rely on being able to automatically try many different combinations of characters.
authenticaiton step that is more difficult for computers to solve. An example of one such system is CAPTCHA
poor policy
Passwords must be hard to guess (many characters, upper and lower case at least).
-
-
-
-
-
-