Please enable JavaScript.
Coggle requires JavaScript to display documents.
ZAFIR AHSAN Network Security - Coggle Diagram
ZAFIR AHSAN Network Security
threats
DDOS
Attack sends many, useless packets to the server which overloads the server with requests, this slows down the server and prevents users from accessing parts of the network due to slow speed
Malware
trojan, virus, adware, spyware, ransomware, spreads onto computer, access files, tracks key from typing in passwords, spreads across networks, corrupts, deletes, locks data, acts as harmless software when it is malware
Brute Force attack
Use set sequences and phrases of words of a trial and error method
Data interception
3rd parties use packet sniffers to pick up radio signals that are transmitted over a wireless network. they gain this data and sort through it, picking out confidential information which they can use brute force to try decrypt the information
SQL Injection
use special symbols and commands which create queries in the database, giving the user access to confidential information
attacks
protections
Penetration testing
White hat hackers find vulnerabilities within the network or system. They report these vulnerabilities back to the company who then fix these problems.
Anti-malware
Anti-malware software scans all the files on the computer regularly and checks for malware. It has a list of malware. The software must be updated regularly as if it isn't, the anti-malware won't detect any new malware that it doesn't know of yet
Firewall
Blacklist, whitelist of programs and data. It allows whitelisted programs past the firewall. It blocks the blacklisted programs. This prevents any malware from entering the network.
Encryption
If data is intercepted e.g. using packet sniffers, the 3rd party won't be able to read the data as it has been converted into ciphertext from readable data using a specific key which the 3rd party doesn't have access to.
Passwords
Physical security
Methods are put in to prevent people from plugging into the system and accessing the network via direct cable connection (ethernet). Locks, cameras can prevent people from accessing the server. Methods are also put in place to prevent flooding and fires e.g. fire extinguisher
User access levels
Managers have access to private information such as the personal details of other employees. Other employees don't have access to this information meaning their data is not compromised