Zusammenfassung der Ressource
System Security-updated
- Types of attack
- Malware
- Spyware
- Secretly moniters the uses actions eg. key presses
- Trojans
- Malware disguised as ligit software
- Keyloggers
- Were the keys are moniterd so they can get info like passwords etc
- Virus'
- They attach by coping themselves to files
- They are then spread and opening infected files activate them
- Ransom ware
- these encrypt all the files and the user is then told to pay alot of money to get the key
- Without paying the files are all lost so many do
- Malware is a software that can harm devices
- They can do this by: deleting/modifying files, scareware, virus', worms etc.
- Denial of Servise
- DoS- were the hackers do not want people to
access a spceific webpage
- They flood the network with so much traffic the network is
very slow and then crashes
- This can happen when a network get so much ligit traffic
it crashes, eg when tickets are on sale
- Brute Force
- An attack that uses software to crack
passwords etc
- they do this by trying everything that it
could be one by one
- Social Engineering
- This is a way or illegally accessing data by influwencings
people and using them
- People often are the weak link in
computer security
- Phishing
- This is were people send emails to accounts claiming to be a ligit
business, sometimes there's a virus in the email other times you
spend money there but its not the real site or give private details
- Pharming
- A website set up to look
like a ligit business' one to
get private details.
Internet users are directed
to this bogus site
unknowingly thinking its
the real one
- How to prevent an attack
- Network Policy's
- This is a set of rules and procedures set out by company's to protect there networks, has things such as, rules about which
passwords are ok, To prevent vanrabilitys
- Passwords
- Making shore that the passwords are strong
- Each person with access keeps there passwords safe, dosnt' tell anyone
- A strong password has a mix of letters, symbles, and numbers
- Firewalls and anti malware
- These act as bounsers checking every thing that go's
out and in the network
- They identify and stop any malisus suff come
on to the network
- Encryption
- This is were the data is translated into a code, this means
that even if it is intersepted by a hacker, then they can not
understand what the data is.
- only someone (or computer) who the data is intended for,
knows what the key is and therefore they are the only ones
that can decrypt the data
- Penetration testing
- This is were companies hire people to simulate attacks to find flours
before a black hat hacker