Please enable JavaScript.
Coggle requires JavaScript to display documents.
Prevention methods and threats - Coggle Diagram
Prevention methods and threats
SQL Injection
Used to gain access to the website or its data
Used on websites to attack a database
Contents of database can be outputted, revealing private data
Data in the database can be amended or deleted
New rogue records can be added to the database
Malware
Deleting, corrupting or encrypting files
Causing computers to crash, reboot or slow down
Internet connections become slow
Keyboard inputs are logged and sent to hackers
Prevention
Strong security software
Firewall
Spam filter
Anti-virus
Anti-spyware
Anti-spam
Enabling OS and security software updates
Staff training: being cautious of opening email attachments and downloading software
Backup files regularly onto removable media
Phishing
Accessing a victim's account to withdraw money, or purchase merchandise and services.
Open bank accounts and credit cards, cashing illegitimate cheques.
Gain access to high value corporate data
Financial services can blacklist the company, resulting in damage to brand reputation
Preventing
Strong security software
Staff training
Awareness of spotting fake emails and websites
Not disclosing personal or corporate information
Disabling browser pop-ups
Unauthorised access
Gain access to high value corporate data
Obtaining an individuals financial details.
Brute force attack
Theft of data
Access to corporate systems
People as a weakpoint
Many system vulnerabilities are caused by people being careless
Not installing or operating system updates
Not keeping anti-malware up to data
Not locking doors to computer rooms
Not logging off or locking their computer
Leaving printouts on desks
Writing passwords down on sticky notes attached to computer
Sharing passwords
Losing memory sticks / laptops
Not applying security to wireless networks
Not encrypting data
Denial of service attack
Loss of access to a service for customers
Lost revenue
Lower productivity
Damage to reputation
Prevention
Strong firewall
Packet filters on routers
Configuring the web server
Auditing, logging and monitoring of systems
Data interception and theft
Usernames and passwords compromised, allowing unauthorised access to systems
Disclosure of corporate data
Theft of data
Prevention
Encryption
Using virtual networks
Staff training: use of passwords, locking computers, logging off, use of portable media
Investing your own network vulnerabilities