Zusammenfassung der Ressource
1.6 System Security V2 Joshua
Guerrero
- Malware
- Damage the computer or network
- Malware scanner
- Anti-Virus
- Malware scanner
- Viruses
- Attaches to a program or a file .This can
affect all components of an operating system .
- Worms
- Replicates itslef and spreads to other computers
- Does not need to attach to a file
- Social Engineering
- This involves someone using data from a program.This does not revolve around technical cra
- Data Interperception
- When they interact with packets that are going to a certain place
- The Packets are encrypted
- Network policy
- AUP
- aceptable use policy
- Brutle force attack
- Trial and error
- This is trying to access based entry system
- An attack that attempts to decode passwords/encryption keys/encrypted data
- DDOS
- Overload a website with unwanted trafic
- Uses a number of computers over a network .To bring the network offline
- SQL
- Where an attacker can execute can execute malicious SQL statements using software which controls a
database management system
- When exploits are found they need to be patched
- They get customer data,intellectual property and sensitive information
- Network forensic
- A branch of digital forensics
- Covers the forensic investigations of networks and their devices attached to them
- Ciphertext
- Normal :A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- Ciphertext:X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
- Firewall
- Advantages
- Controls network traffic/allows data from authorised
- Blocks data from unauthorised sources
- Protects against attackers
- Strong Passwords
- At least eight characters
- Include upper case
- Include lower case
- Include special characters
- Include numbers
- Does not include a name, company name or user name
- Does not contain a complete word