Please enable JavaScript.
Coggle requires JavaScript to display documents.
Adam De Rycke - Network security - Coggle Diagram
Adam De Rycke - Network security
attacks and threats
social engineering
blagging
persuading someone to give up personal information
shouldering
looking over someones shoulder at their passwords
phishing
sending real looking emails to try and get vulnerable people to click links and give up personal data
brute force
testing out all combinations to try break into someone's account
malware
bad software designed to gain personal information or hack into accounts
data interception and theft
deliberately trying to see transactions
denial of service
massive amounts of fake instructions being sent to a website in order to shut it down
SQL injection
inserting SQL commands to try and trick the database
vulnerabilities
firewalls
used like a router, restricts data entering and leaving the network
user access levels
determine who can do what
anti malware software
software that protects against malware
passwords
secret list of characters that only you should know in order to gain access to something: should be long and rememberable
penetration testing
testing out multiple forms of attack to try and simulate a cyber attack to invent ways of keeping out attacks
physical security
actual security to a place. eg door, padlock etc
encryption
scrambling up words or phrases until its unrecognisable to an outsider. need a key to unscramble