Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security - Coggle Diagram
Security
-
Brute force attack
- Attempt to break a password by trying all possible
combinations of letters, numbers, and symbols.
- A brute force attack is when an attacker who does not know the decryption key attempts to determine the key by making millions or billions of guesses.
- Brute force attacks are much faster with modern computers, which is why encryption has to be extremely strong and complex.
- Most modern encryption methods, coupled with high-quality passwords, are resistant to brute force attacks
- although they may become vulnerable to such attacks in the future as computers become more and more powerful. Weak passwords are still susceptible to brute force attacks.
Access levels
Settings that determine who can access an item and what they can do with it (read, write, delete). Applies to files, folders and databases among other things.
Impact: Access levels can provide a way to control who has access to sensitive data and systems, which can help prevent unauthorized access and data breaches.
Problem: Access levels can be vulnerable to attacks if the access control mechanisms are not properly configured or if the users are not properly trained.
Solution: To ensure the effectiveness of access levels, ITGS recommends implementing strong authentication and authorization mechanisms, using role-based access control where appropriate, and providing regular training and awareness programs for users.
-
-
Backdoor
Method of bypassing security in a system, built in by the
system designers
Impact: A backdoor can provide unauthorized access to computer systems, which can lead to data theft, system compromise, and the spread of malware.
Problem: Backdoors can be difficult to detect and remove, particularly if they are designed to evade detection by anti-virus software and other security measures.
Solution: To prevent backdoors, ITGS recommends implementing strong access control measures, monitoring network activity for signs of suspicious behavior, and conducting regular security audits.
-
-
Biometrics
Use of fingerprints, retina scans, or other body features as an authentication mechanism.
Impact: Biometrics can provide a highly secure and convenient way to authenticate users, which can help prevent fraud and protect sensitive information.
Problem: Biometrics can be vulnerable to attacks if the biometric data is compromised or if the biometric system is not properly secured.
Solution: To ensure the security of biometric systems, ITGS recommends using secure biometric capture devices, encrypting biometric data in transit and at rest, and implementing appropriate access control measures to protect the biometric data.
-
CAPTCHA
“Scribble text” displayed as an image, which the user must
type in to verify that they are a person.
Impact: CAPTCHA can help prevent automated bots from accessing online resources or performing fraudulent activities, which can help protect the integrity of online services.
Problem: CAPTCHA can be vulnerable to attacks if the CAPTCHA mechanism is not properly designed or if the attacker uses advanced techniques to bypass the CAPTCHA.
Solution: To ensure the effectiveness of CAPTCHA, ITGS recommends using a combination of different CAPTCHA types, implementing rate limiting mechanisms to prevent brute force attacks, and periodically reviewing and updating the CAPTCHA mechanism.
-
-
-
-
-
-
-
-
-
DNS poisoning
Technique used by criminals to alter DNS records and drive
users to fake sites, to committing phishing.
Impact: DNS poisoning can result in the redirection of web traffic to fraudulent websites, which can lead to phishing attacks, identity theft, and financial loss.
Problem: DNS poisoning is a serious security threat that can be difficult to detect and prevent, particularly if attackers use sophisticated methods and tools.
Solution: To prevent DNS poisoning, ITGS recommends using secure DNS servers, implementing DNSSEC (DNS Security Extensions), and monitoring network activity for signs of DNS tampering.
-
Drive by download
Program which automatically downloads when a user visits a web page, usually without their knowledge or consent.
Impact: Drive by downloads can infect computer systems with malware without the user's knowledge or consent, which can lead to data loss, system compromise, and the spread of malware.
Problem: Drive by downloads can be difficult to detect and prevent, particularly if the malware authors use sophisticated techniques to evade detection.
Solution: To prevent drive by downloads, ITGS recommends using web filtering and anti-virus software, keeping web browsers and plug-ins up-to-date, and educating users about safe browsing habits.
-