Please enable JavaScript.
Coggle requires JavaScript to display documents.
Nathan Baggott 1.4 network security - Coggle Diagram
Nathan Baggott 1.4 network security
attacks and threats
malware
social engineering
phishing
sending an email which looks to be a legitimate webservice, but asks you for personal information e.g. back details.
shouldering
looking over someone's shoulder to see what there personal details are.
blagging
brute force
trying over and over again hundreds of different passwords one after the other.
denial of service (DDOS)
deliberately targeting a server and overwhelming it with requests so that the server goes down.
data interception and theft
sql injection
were inputs are put in to access the entire data base not just a specific one. also the inputs can effect the database if they input says to delete parts of the database
identify vulnerabilities
penetration testing
test ones own system to check were there are security risks
anti - malware software
stops malware from being downloaded onto the computer
firewalls
to stop different types of malware out of a network
user access levels
passwords
encryption
turning readable data into unreadable data so that if a hacker intercepts the data they can not read it.
physical security
cctv, used to make sure that nobody is hacking onto someone elses computer, people can see who had done it and what they had taken