Please enable JavaScript.
Coggle requires JavaScript to display documents.
Prevention methods and threats - Coggle Diagram
Prevention methods and threats
SQL Injection
Used on websites to attack a database
Used to gain access to the website or its data
amending or changing data
Prevention - validation on input boxes, using parameters queries, setting database permissions and penetration testing
Unauthorised Access
Malware
Deleting, corrupting or encrypting files
Causing computers to crash, reboot or slow computers
Prevention - anti malware software, data backups and enabling OS security software
Phishing
Obtaining an individuals financial details
Gain access to high value corporate data
Prevention - strong security software, staff training awareness of scam emails and links, disabling browser pop ups
People as a weak point
Issues caused by people being careless
Not installing the latest updates and operating system
Not locking doors or windows
Leaving printouts on desks
Not encrypting data
losing memory sticks
Not applying wireless network security
Not keeping up to date anti malware
Prevention - physical security as well as good staff training so that they don't make mistakes and be the weak point.
Denial of service attack
Loss of access for customers
lost revenue
reduced productivity
Reputational damage
Prevention - strong firewall,packet filters on routers, configuring the web browser, monitoring of systems
Data interception and theft
Compromising usernames and passwords to gain unauthorised access to a system
Theft and/or disclosure of corporate data
Prevention - encryption, using virtual networks, careful use of computers and logging off, finding your own network vulnerabilities.
Brute force attack
generating a repeated password attempts to gain unauthorised access to a system
Theft and/or disclosure of corporate data
Prevention - Network lockout policy, using progressive delays, using effective passwords, using reCAPTCHA