Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats to a network (Brute Force (image, A supercomputer tries every…
Threats to a network
Brute Force
-
A supercomputer tries every single combination of what a password could until it gets the password right.
A way of preventing this would be to have a very complicated password with a variety of alphanumerical and special characters.
-
Malware
-
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
A way to prevent malware damaging your computer would be to install an antivirus/anti-malware software, or not to look at/install dodgy software.
Poor network policy
A poor network policy means that the network does not have security rules in place for users to follow.
To prevent this, put a reasonable set of rules that your users must follow when creating a network. Use user access levels so different people have different permissions within the network.
-
SQL Injection
Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.
Input sanitation can be used to format all data input into string. Penetration testing could be used to help prevent this.
-
-
Phishing
Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. However, it is a fake website designed to catch data such as bank account numbers and security codes.
A way to prevent this would be having the ability to identify which emails are dodgy and which are not.
-
People
Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses. This behaviour increases the chances of a network being compromised and its data being accessed by unauthorised users. This is sometimes called social engineering.
To prevent this, you could have a reliable network policy with reasonable consequences if rules are broken. Also you could remove the people who are misusing the network from the network. Computer forensics can be used to try and figure out how rules have been broken and by who. Users should create suitable passwords.
-