network security

Cards (11)

  • Malware
    Software which is specifically designed to disrupt, damage or gain unauthorised access to a computer system
  • Phishing
    The fraudulent practice of sending emails purporting to be from reputable companies in order to include individuals to reveal personal information
  • Phishing aims to obtain
    • Passwords
    • Credit card numbers
  • Brute force attack
    A trial-and-error method of trying passwords and pin numbers. Automated software is used to generate many consecutive guesses
  • Brute force attack example
    • Trying every word in the dictionary
  • Data interception and theft
    The unauthorised act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information
  • Data interception and theft example

    • Sniffing usernames or passwords
  • SQL injection
    A technique used to view or change data in a database by inserting additional code into a text input box, creating a different search string
  • Threats
    • Files can be deleted
    • Computers crash, reboot or slow down
    • Internet connection becomes slow
    • Keyboard inputs are logged and sent to hackers (passwords compromised)
    • Data in data bases can be amended, outputted, or deleted
  • How to prevent malware
    • Firewall
    • Spam filter
    • Anti-virus
    • Anti-spyware
    • Anti-spam
    • Staff training
    • Penetration testing
    • Anti-Malware software
    • User access levels
    • Passwords
    • Encryption
    • Physical security
  • People as the weak link
    • Share passwords
    • Not lock doors to computer rooms
    • Lose laptops
    • Not apply security to wireless networks
    • Not encrypt data
    • Not log off their computer
    • Backup files regularly onto removable media (USBs)
    • Enabling OS and security software