Please enable JavaScript.
Coggle requires JavaScript to display documents.
William Pritchard 1.4 Network Security - Coggle Diagram
William Pritchard 1.4 Network Security
Attacks and Threats
Malware
data interception and theft
it means you can potentially replay transactions on http or access network traffic on a website with only http
denial of service attacks
Denial of service attack is to flood a server with requests for data and access of resources to stop legitimate users using he services of the server
brute force attacks
Brute force attack is the use of a program to use multiple combinations of characters to obtain a password until the correct password is obtained
SQL injection
when you inject your own query language into a query search to access data your not really supposed to have
Social Engineering: Phishing, shouldering, blagging
Identify vulnerabilities
user access levels
This defines what a user can ace
This defines what a user can access/do on your account
passwords
This helps to protect against unauthorised access
firewalls
This filters incoming and outgoing network traffic based on the security policies of the device
encryption
This changes data stored in the hard drive to random data. This helps to stop people seeing the data
anti-malware software
Anti-malware software helps to protect the device against malware
physical security
This is used to stop people stealing the data
penetration testing
getting a hacker to hack into something and tell them how they did it