Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.6- System Security - Coggle Diagram
1.6- System Security
-
-
Forms of Attack
Malware
Malicious software specifically designed to gain unauthorized access to disrupt/ damage a computer system (e.g. damage/delete files, take control of the system & steal information
-
Phishing
Fraudulent practice of persuading individuals to disclose private information (e.g. passwords & bank details)
usually done via emails or fake websites, designed to look as if from reputable companies
Brute Force
A trial and error method to guess information (e.g. passwords, pin numbers)
Automated software is used to generate a large number of consecutive guesses (e.g. trying every word in the dictionary)
-
SQL Injection
Structured Query Language is a technique used to view, change & retrieve data in a database by injecting additional code
When maliciously used, it can be inserted to program databases to gain access to sensitive information
Denial Of Service
Flooding a network with traffic to overload the system, causing the network to crash- actual requests won't then get through