Alex Williams - 1.4 network security
Attacks and Threats
Identify vulnerabilities
Malware
Denial Of Service attacks
Social engineering (phishing, shouldering, blagging)
Data interception and theft
Brute force attacks
SQL injection
Anti-malware software
Firewalls
Penetration testing
Passwords
Encryption
User access levels
Physical security
click to edit
click to edit
click to edit
click to edit
click to edit
Changing files with a key so that it is non-readable without a key
click to edit
Worm
A 'worm' replicates itself onto different computers. They can be hidden in email links or downloads, or anything like it.
Spyware
Adware
'spies' on you and your computer by being able to look at all the things you are doing and can even be taking pictures of you, filling up storage
Adware gives you random pop-ups on your computer which can often get annoying and an inconvenience
Phishing emails - An email sent which is made to look like a big company or co-operation. It will have a link attached based on what it wants you to do and will often have different malware on the other side. Often it will ask you to input your credit card information so it can steal it
Shouldering - The act of peering over at someone whilst they are inputting important data which you shouldn't know
Blagging - when someone makes up a fake story to trick someone and to gain their interest. They then use this to ask for personal information or even credit card information