Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Transmission Security Issues - Coggle Diagram
Data Transmission Security Issues
Security issues:
When transmitting data over a network. data can be vulnerable to eavesdropping. Connections could be wired or wireless but if a user has access to the network then it can be listened to.
Sniffing
Packet sniffers are legitimate programs used commonly by network technicians to diagnose problems with a network. but can also be used to gain unauthorized access to data
Instructs your computer to inspect all data bang transmitted over a network, even if its not intended for your computer
Can gain password, credit cards etc, if your device has a direct connection it can get this data
Issue for wireless network as someone could covertly do this
Spoofing
Every computer connected to the internet is identified by a number and some device provide access to services to computers that have a certain number.
sing fake credentials, a user can fool the system into getting access to services meant for another device
Where you get your computer to pretend to be another computer
Can also perform a DoS attack by spoofing IP addresses to make the seem like a legitimate source of data
Security prevention methods
Encryption
taking something understandable and turning it into something apparently unreadable
We encrypt data using an encryption algorithm and an encryption key
Algorithm is the process performed to convert data into cipher text. Referred to as the cipher.
The key is a unique string that is applied to the algorithm to ensure the encryption output is unique
Most common form is public key encryption
Firewalls
Monitors incoming and outgoing network traffic and blocking suspicious packets based on a set of security rules
Can be hardware installed between external and internal networks to protect against external cyber threats
Designed to control the flow of packets of network data into or out of a network
Can also be a software programs, performs the same filtering by protects individual devices rather than the whole network. Also additional features like filtering network traffic to and from software applications