0% found this document useful (0 votes)
11 views6 pages

1.4 Network Security

Uploaded by

zesennychang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views6 pages

1.4 Network Security

Uploaded by

zesennychang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

NETWORK SECURITY

Network security is about keeping networks, computers


and the files, data and programs stored on them safe
from attack, damage and unauthorised access.

Threats to computer systems and


networks
Identifying and preventing
vulnerabilities
Threats to computer systems and networks
Forms of
attack Viruse A virus is a computer program that is hidden within another
s program. The virus code is only run when the host program is
Malwar executed.

e Worm Worms do not need to be hosted in another program. They


often create a ‘back door’
s
 any kind of
malicious Trojans are programs that users are tricked into installing
Trojan
program that under the pretence that they are legitimate and useful.
s
is installed
on a
computer Ransomwa Ransomware is malware that interferes with a user’s
system re operation of a computer unless a sum of money (ransom) is
 usually paid
installed Spywa Spyware is malware that comes packaged with other
without the re software such as free software that a user downloads.
user’s
knowledge
Pharmin Pharming is a form of attack where users are directed to a fake
g website
Threats to computer systems and networks
Data is a very valuable commodity.
Phishi Phishing uses fake emails and websites to trick people into
Data
ng giving away their sensitive data and information.
intercepti
on and
Packet Packet sniffing involves intercepting data using packet
theft
Social engineering sniffing analysers as it is being transmitted across a network.
is
a form of security
attack that involves MITM A MITM attack involves intercepting a device’s connection to the
tricking or attacks internet. Often this is achieved by luring users into using a fake Wi-
manipulating
people into giving
Fi hotspot.
away critical
information or
access details.
SQL SQL injection can be used to bypass security and circumvent the need to
injection enter legitimate
login credentials, thus allowing hackers to gain access to the database.
Threats to computer systems and networks
Forms of
Social
attack Phishing uses fake emails and websites to trick people into
Phishi
engineeri giving away their sensitive data and information.
ng
ng
Social engineering the criminal invents a scenario to persuade the victim to
is Pretexti
a form of security ng divulge information that they might not do otherwise
attack that involves
tricking or
manipulating Shoulderi Shouldering, or shoulder surfing, involves finding out login
people into giving ng details, passwords and PINs by watching people enter them.
away critical
information or
accessBrute
details. A brute force attack is where a hacker attempts to crack a password by
force systematically
attacks trying different combinations of letters and numbers until the correct one is
found.
DoS DoS attacks are designed to bring down servers or websites by flooding them
attacks with superfluous bogus requests
Identifying and preventing vulnerabilities
different methods that can be used to limit threats and protect networks
and computer systems from unauthorised access.
Penetrati
Penetration testing is used to test a system or network in order to identify
on vulnerabilities in its security that an attacker could exploit.
testing
Anti-  It performs real-time scans of incoming network traffic
needs to be able to get regular
malware  It performs periodic scans of the whole system updates
software  If a virus or other malware is detected or manages to install itse t is quarantined

0
A firewall is designed to prevent unauthorised access to a network, and can be
Firewalls
provided by
either a hardware device or a piece of software.
User Users of a network are often arranged into user groups. Each group has different
access user access rights that determine what software, hardware and files they are
levels permitted to access.
Long passwords that use a combination of letters, numbers and symbols will take
Password longer to
s guess in a brute force attack
two-factor authentication (2FA)
Identifying and preventing vulnerabilities
different methods that can be used to limit threats and protect networks
and computer systems from unauthorised access.

Encrypti Encrypting data means that it cannot be read by unauthorised persons, even if they
on manage
to access the data.
Physical
Physical security is about protecting hardware, software, networks and data from
security
physical actions

You might also like