ZAFIR AHSAN Network Security

threats

attacks

DDOS

Malware

Brute Force attack

Data interception

SQL Injection

click to edit

protections

Penetration testing

Anti-malware

Firewall

Encryption

Passwords

Physical security

User access levels

use special symbols and commands which create queries in the database, giving the user access to confidential information

Use set sequences and phrases of words of a trial and error method

Blacklist, whitelist of programs and data. It allows whitelisted programs past the firewall. It blocks the blacklisted programs. This prevents any malware from entering the network.

Managers have access to private information such as the personal details of other employees. Other employees don't have access to this information meaning their data is not compromised

click to edit

White hat hackers find vulnerabilities within the network or system. They report these vulnerabilities back to the company who then fix these problems.

Anti-malware software scans all the files on the computer regularly and checks for malware. It has a list of malware. The software must be updated regularly as if it isn't, the anti-malware won't detect any new malware that it doesn't know of yet

If data is intercepted e.g. using packet sniffers, the 3rd party won't be able to read the data as it has been converted into ciphertext from readable data using a specific key which the 3rd party doesn't have access to.

Methods are put in to prevent people from plugging into the system and accessing the network via direct cable connection (ethernet). Locks, cameras can prevent people from accessing the server. Methods are also put in place to prevent flooding and fires e.g. fire extinguisher

Attack sends many, useless packets to the server which overloads the server with requests, this slows down the server and prevents users from accessing parts of the network due to slow speed

trojan, virus, adware, spyware, ransomware, spreads onto computer, access files, tracks key from typing in passwords, spreads across networks, corrupts, deletes, locks data, acts as harmless software when it is malware

3rd parties use packet sniffers to pick up radio signals that are transmitted over a wireless network. they gain this data and sort through it, picking out confidential information which they can use brute force to try decrypt the information