1.4 Network Security Flashcards
Different forms of network attack
Passive attack
Active attack
Insider attack
Brute force attack
Denial of Service attack (DoS)
Malware full form
Malicious Software
Malware
installed on a person’s device without their consent
Ways in which malware can access your computer
Viruses
Worms
Trojans
How viruses enter the computer
Attach to files. Activated when the user opens the file
What do viruses do?
Deletes/corrupts data
How Worms enter the computer
Like viruses, but self – replicate (without users interaction)
What do worms do?
Slows down the computer/creates backdoors
How trojans enter the computer
Looks like legitimate software. Users install them thinking that they are legitimate software
What do trojans do?
Slows down the computer/creates backdoors
Typical Actions of Malware
Ransomware
Scareware
Spyware
Ransomware
Encrypts users files and asks for money in exchange for the decryption key
Scareware
Tells the user that their computer is infected with viruses and provides malicious links to ‘solve’ them
Spyware
Secretly monitors user actions
Social Engineering
influencing/manipulating people to give sensitive information
Phishing
when criminals send emails/texts to people claiming to be from a well – known company, and asks the user to update their personal details -> these are sent to criminal
Normally have poor grammar.
Defense against Phishing
firewall – reduces no. of phishing emails recieved
SQL injection
SQL commands entered into website’s input box to gain access to database -> sensitive information
When will SQL injection work?
Will work if a website does not have strong input validation
What organisations can do to prevent network attacks
Penetration Testing
Physical Security
Passwords
User Access Levels
Anti - Malware Software
Encryption
Penetration Testing
Company employs specialists to simulate a potential attack on the network -> to find weaknesses that can be fixed
Physical Security
Protects the physical arts of a network
e.g. locks/passwords to restrict access to server room, surveillance cameras, motion sensors
Passwords
Help prevent unauthorised access to the network
Should be strong-> combination of letters, symbols, numbers
User Access Levels
Control which parts of the networks certain people can access
Help to limit number of people with access to sensitive information
Anti-Malware Software
To find + stop malware from damaging the network
e.g. Anti – Virus, Firewalls
Encryption
Data (plain text) is translated into a code (cipher text) which can only be read if a person has a decryption
Passive Attack
- Someone monitors data travelling on a network to intercept sensitive information ->; done by packet sniffers
- Hard to detect
Active Attack
- Someone attacks a network using malware
- Easily detected
Insider Attack
- Someone within an organisation uses their network access to steal information
Brute Force Attack
- Type of Active Attack -> uses trial and error to crack passwords + gain information
Denial of Service Attack (DoS)
- When a hacker tries to stop users accessing a website by flooding the network with useless traffic
Defense of Passive Attack
data encryption
Defense of Active Attack
Firewall