You are on page 1of 1

Network threats:

- Passive attack = data is monitored whilst it is travelling on a network, any sensitive information if intercepted.
They may use software’s like packet sniffers. – passive attacks = hard to detect, best defence = data encryption
- Active attack = network is attacked with malware – main defence = firewall
- Insider attack = person in an organisation exploits their network access to steal info.
- Brute force = automated software produces possible passwords combinations – defence = locking an account
after multiple failed password attempts
- Denial of service attack (DoS) – hacker tries to stop users from accessing a part of a network. – Most DoS involve
flooding a network with traffic – makes the network slow

- Malware = malicious software installed on someone’s device without consent


- Typical malware actions = deleting/ modifying files, locking files (encrypts files and holds them ransom), spyware
(secretly monitors user actions)

- Virus’ – attach themselves to certain files (e.g. .exe),


- Worms – self-replicating virus’ – spread quickly – exploit weaknesses in network securities.
- Trojans – malware disguised as legit software – don’t replicate

Weak points in secure systems:


- People: social engineering = method of gaining sensitive info through influencing people, usually employees of
large companies
- Common form of social engineering = scam calls
- Phishing = social engineering – when criminals send email/texts to people claiming to be from a legit business

SQL injections:
- Networks that use databases are vulnerable to this attack. SQL = structured query language
- SQL injection = pieces of SQL typed into a websites input box – revealing sensitive info
Example:
Website lets you view your account info if u enter your password. – if the websites SQL does not have a strong
input validation, then someone may be able to enter some SQL code that lets them access other people’s
account info.

Penetration testing = Systems are tested for vulnerabilities to reveal any weaknesses in the system which can be
fixed.

Antimalware = Avast, McAfee, Malwarebytes

Firewall = An application that prevents unauthorised connections to and from the Internet.

User access levels = a large company or school, many people will be using computers on the same network. A
network manager will normally control the level of access people have to the network. General users will not have
the ability to download any software they want or to make changes to any part of the system, as that could affect
other users.

Encryption is the process of encoding data or a message so that it cannot be understood by anyone other than its
intended recipient.

Physical security – login USBS, covering your pin etc.

You might also like