security issues Flashcards
brute force attack
where criminals use
trial and error to hack an account by trying
thousands of different passwords
Phishing
impersonate legitimate companies (such as banks) and ask you
to give away sensitive information.
Denial of Service Attacks (DoS)
bringing down websites by using up the web server’s resources.
or
sends large amounts of data to a wifi router
SQL Injections
stands for Structured Query Language and is used to lookup data in a database.
eg. With SQL injections, you can ‘bolt on’ some SQL to the end of your password. This will then
alter the SQL statement and allow you to access the accounts of other users.
People - Social engineering
act of manipulating people
is often used by criminals to
force people to make mistakes
which can compromise a network’s security.
Network Policies
Use complex passwords
Have different levels of access (only certain people in a company can access sensitive data)
Lock computers if the user leaves their desk
Penetration Testing
where a company will invite / employ experts to try to simulate a range
of network attacks
Firewalls
firewall monitors the data which flows
Encryption
data is scrambled before being sent across a network so that its
unreadable if intercepted.