Please enable JavaScript.
Coggle requires JavaScript to display documents.
Azaan Afridi - 1.4 Network security - Coggle Diagram
Azaan Afridi - 1.4 Network security
attacks and threats
malware
software designed for malicious intent on computers eg stealing data or damaging the system
brute force attacks
Using a computer to try every single possible password combination until it gets it right
social engineering
phishing
When attacker send email or message pretending to be a company asking for details
blagging
similar to phishing but targeted at a
specific person
shouldering
looking over someone's shoulder
for data like passwords and pins
denial of service
overloading a web with traffic leaving it unable to function
data interception and theft
act of intercepting data over
a non secure network
SQL injection
Code injection technique used to attack websites
Security
penetration testing
Penetration testing is
the act of attempting
to breach your own
data to see how
improvements could be
made to security
anti-malware software
software designed to
protect computer against malware
firewalls
network security that
monitors incoming and
outgoing network traffic
and is able to block it
user access levels
Permissions allowed to
each user
passwords
longer passwords better
than short ones with
different character types
like numbers and cases
encryption
process of turning information
or data into code using a cypher
that can only be deciphered
using a key, keeping data secure