network threats

    Cards (6)

    • MALWARE (software designed to cause harm or damage to a computer)
      • viruses: Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
      • worm: Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails.
      • trojans: Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
    • SOCIAL ENGINEERING (manipulate people into giving up their personal information)
      • phishing: sending emails or text messages (SMs) claiming or appearing to be from a bank/ e-commerce site asking for personal details.
      • vishing: phone calls
      • human error: ignore rules, or accidentally or deliberately break them
      • blagging: inventing a scenario to persuade a victim to give out information
    • HACKING
      • brute force: program to find a password by trying all possible combinations of characters until correct one
      • denial of service (DoS): computer used to prevent a server from performing its tasks by bombarding the server with requests and the server is tied up trying to handle all the DOS requests - difficult for it to respond to legitimate requests.
      • data interception & theft: shouldering, gaining access of a computer (irl) and man in the middle attack (communications between two parties is intercepted)
      • SQL injection: inputted as data, which can cause errors or unintended operations.
    • penetration testing is the process of testing a system to see if it can be penetrated by an attacker
      • external: position of hacker targeting email servers, web servers, firewalls to see if a hacker can get in and how far and what they can do
      • internal: position of user to see how much damage it could cause
    • PREVENTING 1
      • anti-malware: detects, prevents, removes malware on a system eg harmful programs, important files eg OS from being changed / detected, viruses (regular updates)
      • firewall: application preventing unauthorised connections to & from Internet / private network (eg access from where, type of traffic, web site addresses) / accessing suspicious sites (acting as proxy server)
      • password protection: validation techniques & access levels
      • user access levels: limits actions user can take, reducing the chance of threats
    • PREVENTING 2
      • encryption: altered with secret code and are unreadable to unauthorised parties.
      • physical security: cctv, security locks and guards