Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.4 Network security - Coggle Diagram
1.4 Network security
Threats to networks
Malware
Files are deleted, become corrupt or are encrypted
computers crash, reboot spontaneously and slow down
-
-
Phishing
-
opening bank accounts and credit cards, cashing illegitimate cheques
-
financial service can backlist the company, resulting in damage to brand reputation
-
-
-
SQL injection
contents of databases can be output, revealing private data
-
-
-
-
Forms of attack
Malware
Software designed to disrupt, damage or gain unauthorised access to a computer system
eg. viruses, worms, trojan horses, ransomware, spyware. adware, scareware
Phishing
sending fraudulent emails purporting to be from reputable companies in order to reveal personal information
Brute force attack
A trail and error method of attempting passwords, usually generated by an automated software
Data interception
The unauthorised act of stealing computer-based information from a victim with the intent of compromising privacy
-
-
SQL injection
A technique used to view or change data in a database by inserting additional code into an input box, creating a search string