Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats ⚠🔪 (Poor network policy (Danger: A poor network policy means that…
Threats ⚠🔪
Poor network policy
Danger: A poor network policy means that the network does not have security rules in place for users to follow.
To prevent: Place a set of rules that your users must follow when creating a network as well as using user access levels so different people have different permissions within the network.
-
SQL Injection
Danger: SQL code is entered as a data input. Many databases use SQL code to interrogate the data. SQL code can be inputted as data, which can cause errors or unintended operations.
-
-
Data interception
Danger: Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.
To prevent: A way to prevent this would be to use WEP or WPA encryption, you could also install a firewall.
-
Malware
Dangers: Malware is any software designed to cause damage to a computer, server, client, or computer network.
To prevent: A way to prevent malware from damaging your computer would be to install an antivirus/anti-malware software.
-
Brute force
Dangers: A supercomputer tries every single combination of what a password could until it gets the password right.
To prevent: A way of preventing this would be to have a very complicated password with a variety of alphanumerical and special characters.
-
Denial of service
Danger: This is when someone spams another person's network with pointless requests. When overwhelmed by a DOS attack, the network will stop being able to function and shut itself down.
To prevent: To prevent this, you could avoid releasing your IP to public.
-
Phishing
Dangers: Emails that trick users into giving away personal details. The phishing email disguises itself as a genuine email and deceives the user into clicking a link to a website that looks like the real company. However, it is a fake website designed to catch data such as bank account numbers and security codes.
To prevent: A way to prevent this would be having the ability to identify which emails are dodgy and which are not.
-
Brute force
Dangers: A supercomputer tries every single combination of what a password could possibly be until it gets the password right.
To prevent: A way of preventing this would be to have a very complicated password with a variety of alphabetical and numerical characters.
-