Please enable JavaScript.
Coggle requires JavaScript to display documents.
Matthew Burman 1.4 network security - Coggle Diagram
Matthew Burman 1.4 network security
Attacks and Threats
malware
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
social engineering
phishing
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
shouldering
looking at someones information over their shoulder
blagging
tricking people into thinking you are from a reputable company to get them to reveal personal data
brute force attacks
repeatedly guessing a password to gain access
denial of service(DDOS)
overwhelm a target website with fake traffic
data injection and theft
An attacker exploits the failure of the web application to filter data provided by users before it inserts that data into a server-side interpreted HTML file.
SQL injection
a cyberattack that injects malicious SQL code into an application, allowing the attacker to view or modify a database
Identity vulnerabilities
penetration testing
an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system
anti-malware software
software designed to prevent malware attacks
firewalls
protects a network from unauthorized access
user access levels
define what information different users can access
passwords
a secure word to gain administration
encryption
the method by which information is converted into secret code that hides the information's true meaning
physical security
physically protecting hardware