Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.4 Network Security - Coggle Diagram
1.4 Network Security
1.4.1 Threats to computer systems and networks
forms of attack
Malware
Social Engineeing
Phishing
People as the weak point
Brute force attacks
DOS attacks
Data interception and theft
SQL injecting
1.4.2 Identifying and preventing vulnerabilities
Common preventing methods
Penetrating testing
Anti malware software
Firewalls
User acess levels
Passwords
Encrypting
Physical security