threats to networks
written to cause loss of data, encryption of data and data theft
How to prevent vulnerabilities from malware?
Install updates for OS system, instal anti-malware/virus software, take backups of files.
Sending emails that look like they're from legit companies to try to get people to give away personal info.
How to prevent vulnerabilities from phishing?
Enable anti-spam filters, disable browser popups, train staff to recognise fake pages/emails.
Brute force attack
A trial and error way of attempting passwords, usually done by automated software.
How to prevent vulnerabilities from brute force attacks.
User and password delays after a certain number of attempts, policy to lock accounts after a certain number of invalid login attempts, use CAPTCHA, train staff to use strong passwords.
Denial of service attack
Flooding a server with so much traffic that the network becomes slow or inaccessible.
How to prevent vulnerabilities from denial of service attacks.
Keep firewalls up to date, ensure all network policies are in place and enforced, carry out network forensics regularly.
Data interception and theft.
Intercepting and stealing data using 'packet sniffers', criminals can steal logins passwords, PINs etc.
How to prevent vulnerabilities from data interception theft.
Carry out network forensics regularly, train staff to lock their devices, ensure all data is encrypted.
Inputting specially created commands into website login pages to gain access to the database.
How to prevent vulnerabilities from SQL injections.
User access rights to database are in place, carry out penetration testing, parameter inquiries.
Name 5 types of malware.
Virus, worm, trojan, spyware and ransomware.
Viruses attach to certain files then when user opens the file they activate and usually have a harmful effect.
Disguised as legit software so user doesn't realise when they download them. They are annoying or malicious.
Monitors user actions secretly.
Usually delivered by phishing and user clicks on link and receives a threat.
Like a virus only it replicates by itself without the need of user help, so they can spread very quickly.
YOU MIGHT ALSO LIKE...
WEB 201 Digital Security
Chapter 8 - Basic Security
Emerging Technology Terms
OTHER SETS BY THIS CREATOR
Topic 7 - Organic Chemistry
Homeostatis and response
Romeo and Juliet Main Events
THIS SET IS OFTEN IN FOLDERS WITH...
OCR GCSE COMPUTING REVISION
OCR GCSE Computing overview
1.5 Network Protocols
1.7 Systems Software