1.4 network security Flashcards
6 Different forms or attack
- Malware
- Phishing
- Brute force
- Denial of service
- Data interception and theft
- SQL injection
Malware
Software written to infect computers and commit crimes.
Malware Crimes
- Fraud
- Identity theft
Examples of malware
- Viruses
- Trojans
- spyware
Phishing
Someone disguising themselves as a trustworthy source in a electronic communication such as emails or fake website
Phishing purpose
Designed to get you to give away personal information:
- Usernames
- Passwords
- Credit card details
Brute force attack
Trail an error program to try and decode encrypted data
Denial of service
Flooding a server with useless traffic causing the server to become overloaded and unavailable
Data interception and theft
An attacker monitors data stream to and from a target in order to gather sensitive information
Malware threats
- Files deleted, encrypted or corrupt
- PC crash, reboot spontaneously and slow
down - Internet connection becomes slow
- Keyboard inputs are logged and sent to
hackers
Phishing threats
- Access victim account to withdraw money or
purchase merchandise
Denial of service threats
- Damage to reputation
- Lost in profits
Data interception and theft threats
- Theft of data
How to prevent malware
- Firewall
- Anti-virus
- Enabling OS and security software updates
- Staff training
- Backup files regulary
How to prevent phishing
- Strong security software
- staff trainingH