Secretly moniters the uses actions eg. key presses
Trojans
Malware disguised as ligit software
Keyloggers
Were the keys are moniterd so they can get info like passwords etc
Virus'
They attach by coping themselves to files
They are then spread and opening infected files activate them
Ransom ware
these encrypt all the files and the user is then told to pay alot of money to get the key
Without paying the files are all lost so many do
Malware is a software that can harm devices
They can do this by: deleting/modifying files, scareware, virus', worms etc.
Denial of Servise
DoS- were the hackers do not want people to
access a spceific webpage
They flood the network with so much traffic the network is
very slow and then crashes
This can happen when a network get so much ligit traffic
it crashes, eg when tickets are on sale
Brute Force
An attack that uses software to crack
passwords etc
they do this by trying everything that it
could be one by one
Social Engineering
This is a way or illegally accessing data by influwencings
people and using them
People often are the weak link in
computer security
Phishing
This is were people send emails to accounts claiming to be a ligit
business, sometimes there's a virus in the email other times you
spend money there but its not the real site or give private details
Pharming
A website set up to look
like a ligit business' one to
get private details.
Internet users are directed
to this bogus site
unknowingly thinking its
the real one
How to prevent an attack
Network Policy's
This is a set of rules and procedures set out by company's to protect there networks, has things such as, rules about which
passwords are ok, To prevent vanrabilitys
Passwords
Making shore that the passwords are strong
Each person with access keeps there passwords safe, dosnt' tell anyone
A strong password has a mix of letters, symbles, and numbers
Firewalls and anti malware
These act as bounsers checking every thing that go's
out and in the network
They identify and stop any malisus suff come
on to the network
Encryption
This is were the data is translated into a code, this means
that even if it is intersepted by a hacker, then they can not
understand what the data is.
only someone (or computer) who the data is intended for,
knows what the key is and therefore they are the only ones
that can decrypt the data
Penetration testing
This is were companies hire people to simulate attacks to find flours
before a black hat hacker