Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Security - Coggle Diagram
Network Security
Types of Malware
-
Ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid. Ransomware attacks are designed to force victims to pay a ransom. Additionally, companies can lose money due to the costs of remediating the 'infection'; lost business; and potential legal fees. Some ransomware attacks encrypt data as part of their extortion efforts.
Phishing
Sending emails purporting to be (pretending to be, or implying that they are;) from reputable companies, designed to incite people to reveal their personal information.
SQL Injection
A technique used to view or change data in a database by inserting additional code into text boxes. If a database has not been programmed using modern techniques, hackers may be able to output; modify; or delete records by entering SQL code into the text boxes intended for users to search the database.
Malware
Software written to infect computers, allowing you to conduct crimes, including; fraud and identity theft.
Malware is a large business, people engaging in; web surfing; shopping; banking; email; instant messaging; and gaming without proper protection are often targeted.
Trojan
Trojan is a type of malware that downloads onto a computer disguised as a legitimate program. The 'delivery method' typically sees an attacker use social engineering to hide malicious code within legitimate software to try gain access with their software.
Data Interception
The unauthorised act of stealing computer-based information. These methods will allow hackers to obtain; usernames; passwords; and other sensitive information from individuals and companies. They often keep an eye put for; passwords written on Post-it notes; printed documents lying around; or computers left unlocked.
Brute Force Attack
A 'Trial-and-Error' method of attempting to crack a password. Automated software is used to generate a continuous stream of guesses. A brute-force attack is an easy way to gain access to a secure system. Most people have passwords that are easy to guess or crack. Sites to avoid include those using lock-out policies , progressive delays and challenge response.
-
-