Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.6 systems security - Coggle Diagram
1.6 systems security
-
-
brute force attacks
-
often uses automated software to attempt to gain access by trialling common passwords and combinations of words and numbers
-
-
user access levels
helps to limit the number of people with access to the more important data so helps to prevent insider attacks
-
network forensics
-
this includes capturing data packets and analysing them to discover how the network had been attacked and to see how to prevent this in future
-
phishing
emails sent from hackers pretending to be reliable websites and companies such as banks or online retailers often providing links to update of confirm details allowing the hacker to access the account
-
-
-
-
penetration testing
when organisations employ specialists often old hackers to simulate attacks on their network to identify any weaknesses and reporting back
-