Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity threats - Coggle Diagram
Cybersecurity threats
Network security
-
-
-
-
-
-
MAC address filtering
-
issue
Using a wireless network analyser, hackers can see all computers on network and change theirs
Firewalls
Network security system that monitors and controls all incoming and outgoing network data transfer based on a set of security rules.
-
-
Penetration testing
Organisations employ specialists to simulate potential attacks on their network to identify vulnerabilities
-
-
2 types
White box Pen testing
-
Benefits
-
-
tests quality of code, app design etc.
-
-
-
-
Types of attacks
-
Malicious Software
-
-
Types
-
-
-
-
-
-
Stealth virus
avoids detection by masking itself from applications, redirecting commands around itself.
Retrovirus
Malware that attacks or bypasses the antivirus software, can potentially change the virus definition file.
File infector
-
When infected file is executed, it attempts to infect other files
Polymorphic Virus
Changes its form each time its executed, avoiding detection/removal by antivirus
Ransomware
a type of malicious software designed to block access to a computer system until a sum of money is paid.
-
-
-
-
-
SQL Injection
Hacker enters an SQL command onto the field on the website with a view to gaining access to infor they shouldn’t have or deleting info.
Websites that make use of databases can fall to SQL injections if they are not protected by strong enough validation
Social Engineering
-
Gaining unauthorised access or obtaining confidential information by taking advantage of the trusting human naiveté of some victims and other
Hacking
Watch out for backdoors
Unauthorised method of gaining access to system, bypassing normal security methods
-