Please enable JavaScript.
Coggle requires JavaScript to display documents.
Elizabeth Melhuish-Bolton 1.4 Network Security - Coggle Diagram
Elizabeth Melhuish-Bolton 1.4 Network Security
Attacks and Threats
Malware
Software that takes advantages of vulnerabilities to infect computers with malicious intents.
Social Engineering
Phishing
An email sent, usually with a link, with the intention of gaining unauthorised access to the victim's dta and information.
Blagging
Pretending to be somebody else to gain sympathy of another person in order to gain sympathy and taking advantage of human vulnerabilities.
Shouldering
Looking over somebody's shoulder to spy on their passwords, for example looking at somebody entering their pin number.
Brute Force Attack
A trial and error method of gaining unauthorised access to accounts or data by guessing a password repeatedly.
Denial of Service Attack
When a server is purposely overloaded with fake traffic to prevent it form working and preventing access to the website.
Data Interception and Theft
Data sent across a network that is not secure and data is accessed by somebody who is not meant to have access.
SQL injection
When somebody tries to gain unauthorised access to a database through entering code through a query.
Identifying Vulnerabilities
Penetration Testing
Purposely hacking a network to find the vulnerabilities
Anti-Malware Software
Software designed to scan and erase malware in a computer.
Firewalls
Used like a router between networks, to restrict data entering and analysing data.
User Access Levels
Giving different people different access to different types of data, for example in a school a student would have a lower access level than a teacher.
Passwords
Encryption
Putting messages into code when sent over a network, so only the computers with the key can understand it.
Physical Security
Using physical methods of protecting network components, such as locking them in a room with only certain people with access to the room