Alex Williams - 1.4 network security

Attacks and Threats

Identify vulnerabilities

Malware

Denial Of Service attacks

Social engineering (phishing, shouldering, blagging)

Data interception and theft

Brute force attacks

SQL injection

Anti-malware software

Firewalls

Penetration testing

Passwords

Encryption

User access levels

Physical security

click to edit

click to edit

click to edit

click to edit

click to edit

Changing files with a key so that it is non-readable without a key

click to edit

Worm

A 'worm' replicates itself onto different computers. They can be hidden in email links or downloads, or anything like it.

Spyware

Adware

'spies' on you and your computer by being able to look at all the things you are doing and can even be taking pictures of you, filling up storage

Adware gives you random pop-ups on your computer which can often get annoying and an inconvenience

Phishing emails - An email sent which is made to look like a big company or co-operation. It will have a link attached based on what it wants you to do and will often have different malware on the other side. Often it will ask you to input your credit card information so it can steal it

Shouldering - The act of peering over at someone whilst they are inputting important data which you shouldn't know

Blagging - when someone makes up a fake story to trick someone and to gain their interest. They then use this to ask for personal information or even credit card information