Zusammenfassung der Ressource
1.6 System Security
- Malware
- trojan
- decieves people to download it
- deceptive
- get informed w/ latest tricks
- program that looks good but is bad
- designed to gain unauthorised access
to a computer system
- software written to
infect computers
- on internet without
protection = at risk
- fraud and identity theft
- Phishing
- online fraud techinque
- spamming people with fake messages
- lures people into revealing personal info
- credit cards, passwords etc.
- fastest online crime method
- identity theft
- Brute Force
- trial and error method
- decrypting data (passwords etc)
- Denial of Service
- flooding a server with useless traffic
- prevents them from responding to
client server requests
- service attack (DDOS)
- multiple infected systems all
target one system
- Data Interception and Theft
- packet sniffer program
- the data goes where its not supposed to go
- monitors traffic
- stealing data
- SQL Injection
- technique to change data in a database
- by inserting additional
code into text input box
- used to hack data
driven applications
- creates a different search engine
- WAYS OF PREVENTION
- penetration testing
- network forensics
- network policies
- anti-malware software
- firewalls
- user access levels
- passwords
- encryption
- THREATS IN NETWORK
- people as 'weak point' (social engineering)
- network policy