Please enable JavaScript.
Coggle requires JavaScript to display documents.
Ffion Chilton - 1.4 network security - Coggle Diagram
Ffion Chilton - 1.4 network security
Attacks and Threats
malware
software written to infect computers
exploits vulnerabilities
fraud/identity theft
types
viruses
trojans
worms
ransomware
spyware
adware
social engineering
phishing
ways to access personal information
fake emails
shouldering
reading over someone's shoulder
blagging
using human vulnerabilities to pretend to be someone else
brute force attacks
trail and error attempts at passwords
denial of service attacks
deliberately attempt to disable a server
overloading it with packets
data interception and theft
intercepting and editing data
SQL injection
SQL code to output private data
Identification Vulnerabilities
penetration testing
employ hackers to hack their company
to find weaknesses
anti-malware software
scan files and programs for viruses
need to be kept up to date
firewalls
restrict data entering
acts like a router
user access levels
allowing different people different levels of data
eg some can edit, some can read
passwords
series of letters, numbers or symbols only you know that grants you access to a server
encryption
physical security
eg CCTV