Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats and Prevention Methods - Coggle Diagram
Threats and Prevention Methods
SQL Injection
SQL injection is where a hacker inputs code into a text box to gain access to a network, the prevention method for this would be penetration testing that would find out if any fixes needed to be made.
Brute Force
A brute force attack is a piece of software that inputs every password until one eventually works, the prevention method needed would be penetration testing as it would find out if brute force attacks could affect the network.
Malware
Malware is malicious software and it includes: viruses, worms, trojans and ransomware. The prevention method needed would be an antivirus as it would delete any viruses that got on the network.
Phishing
Phishing is where a hacker impersonates a trusted company, and gets a user to input personal information into a fake website.
Social Engineering
Social engineering is where people with access to networks are tricked into given information that could allow someone else access, this can be done by impersonation. The prevention method would be user access levels so more trusted users have more power than less trusted users.
User Access Levels
User access levels give different people on a network different permissions, for example some people may be able to edit while others cant.
Good Network Policies
Good network policies are the opposite of poor network policies and they protect a network from attacks. An example of a good network policies would be making users change their password regularly.
Poor Network Policies
Poor Network policies allow things like poor passwords that would allow someone easy access into a network using a brute force attack, the prevention method for this would be good network policies.
Antimalware
Antimalware finds and deletes any malware on a network, this can happen before or after it has infected the network. They also stop any suspicious data to be downloaded onto the network.
Penetration Testing
Penetration testing is where a white-hat hacker is paid to gain access to a network, and then report any security issues back to the owners.
Firewall
A firewall intercepts all packets entering a system and stops malware and suspicious packers from entering.