Please enable JavaScript.
Coggle requires JavaScript to display documents.
Taylor Downey-Jones - 1.4 - network security - Coggle Diagram
Taylor Downey-Jones - 1.4 - network security
attacks & threats
malware
Virus
Trojan
a program that appears harmless but it is in fact malicious
worm
a piece of malware that finds holes in the security system
adware
a program that displays adverts or pop-ups
ransomware
an account being held hostage for an exchange of currency
Virus
a piece of code which is capable of copying itself
Social engineering (Phishing, shouldering, blagging)
it involves manipulating others into giving you their personal information
brute force attacks
it involves repeatedly trying a password over and over again until it is corrected
denial of service attacks
overloading a website with network packets to stop users from accessing the website
data interception and theft
when someone goes packet sniffing using WAP, hackers can see information that is currently being sent
SQL injection
disrupting on a database
Identify vulnerabilities
penetration testing
when a company hires two people to try and hack the server to see how much data that they can collect, one hacker usually is internal and has a work IP address whilst the other hacker is just and external hacker.
Anti-malware software
Checks your device to see if anything malicious is stored on your computer
firewalls
looks to see what data is coming in to your computer and checks whether if it is on a blacklist or a whitelist
user access levels
where different users on a system have different security levels so basic users cant access important commands
Passwords
things that help secure your login
Encryption
when you send data which has been made unreadable by the human eye
Physical security
keeping data physical secure