Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.4 network security, Identifying vulnerability - Coggle Diagram
1.4 network security
attacks + threats
denial of service attack
bombarding a server with tones of requests from devices to get the actual request from the users to wait for a long time before being executed
-
-
-
social engineering
including using people as weak point to gain access to personal details. phishing- clicking on links of fake emails. blagging - manipulating people via speeches and conversations to persuade them giving away personal information. shouldering- looking over someone's shoulder physically for stealing their information
malware
software designed on purpose to invade disrupt and cause damage to a computer system. eg. Adware, spyware, virus, trojan. etc
-