Taylor Downey-Jones - 1.4 - network security

attacks & threats

Identify vulnerabilities

malware

Social engineering (Phishing, shouldering, blagging)

brute force attacks

denial of service attacks

data interception and theft

SQL injection

penetration testing

Anti-malware software

firewalls

user access levels

Passwords

Encryption

Physical security

Virus

Trojan

worm

adware

ransomware

a program that appears harmless but it is in fact malicious

a piece of malware that finds holes in the security system

Virus

a piece of code which is capable of copying itself

a program that displays adverts or pop-ups

an account being held hostage for an exchange of currency

it involves manipulating others into giving you their personal information

it involves repeatedly trying a password over and over again until it is corrected

overloading a website with network packets to stop users from accessing the website

when someone goes packet sniffing using WAP, hackers can see information that is currently being sent

disrupting on a database

keeping data physical secure

when a company hires two people to try and hack the server to see how much data that they can collect, one hacker usually is internal and has a work IP address whilst the other hacker is just and external hacker.

Checks your device to see if anything malicious is stored on your computer

looks to see what data is coming in to your computer and checks whether if it is on a blacklist or a whitelist

where different users on a system have different security levels so basic users cant access important commands

things that help secure your login

when you send data which has been made unreadable by the human eye