Trial and error is a brute force
attempt to access a computer
system.
Phising
Denial
Of
Service
It is a type of attack when multiple
compromised systems which are often
infected with trojan and uses it to target a
single system.
SQL
injection
Data interception
and theft
Data interception and theft is a hacker has stole data from a
computer. They can do this by tapping a connection, intercepting
wireless traffic, or plugging into a network and monitoring traffic.
Phising is usually disguised as a used popular
website or spammed messages so you provide your
email address and other personal details. It pretends
to be trustworthy.
Encryption
where data is translated into code
so that only authorised users, or
users with the key can decrypt it.
What is system
security and
cyber attacks?
A cyber attack is an attempt to gain
unauthorised access to or control of a
computer and the network which it is
connected to
Security is a set of
measures taken to
protect a computer
from harm to the
data and software.
Reasons for Network security
Confidental data
Data Theft
Data Loss
Data Changes
Legal obligations
Worms are a network
threat as they are hard to
get rid of as they copy
themselves over networks to
external storage and other
computers
Spyware collects your information
and sends it to somebody.
A keylogger can be either hardware or software. It is designed to
record every key that is pressed on a keyboard, therefore giving
access to all the data that is entered into a computer such as
usernames, passwords or websites visited.
A trojan is a program which
is designed to deliberately
trick a user in to downloading
and installing malicious
software.
Identifying and
preventing
vulnerabilities
Passwords
Encryption
Firewalls
Network
policies
Network forensics
Penetration testing
User access levels
Social Engineering
Relies on human interaction
Commonly involves tricking
users into breaking normal
security procedures
Malware
It is malicious software that
causes identify theft,
financial loss and
permanent file deletion.
Virus
A virus harms your computer in some way. It
usually deletes or begins altering files and
stops programs from running.
Around 82,00 viruses are made each day
Can affect all components of an
operating system
DDOS
Overloads a website
with unwanted traffic
The effects of a successful
attack
Execute queries, exposing
data
Delete
data
Altering data, resulting
in data integrity issues
Bypass
authentication
procedures and
impersonate
specific user
Anti malware
software
Software with the aim of preventing
malware from entering the system.
Firewalls
Software that performs a
'barrier' between a
potential attack and the
computer system
Monitor application and
network usage
Can be held on a server, or a
standalone computer
Network Policies
Defines how a system can be
secured through specific rules or
requirements.
Explains how particular a user should access
and treat a system
User Access Levels
also known as system access rights
allows a system
administrator to set up a
hierarchy of users.
Lower level users would have
access to limited information and
settings.
Higher level users can access
the most sensitive data on the
system
Biometric security
Can be used in
addition to 'standard'
password entry
Examples - retina scan,
fingerprint, voice and facial
recognition.
SQL
injection
attacks could access
systems containing
customer data, intellectual
property and other
sensitive information
Malicious code to be user in an SQL
query when it is run in order for the
injection attack to take place.
Network Forensics
A branch of digital
forensics
Covers the forensic
investigation of networks and
their devices attached to them
primarily involves the
examination of data
sent across a network
May involve the user of
various forensic techniques
including 'packet sniffing'
Packet sniffing involves the interception
of packets across the network
Packet sniffing tools
can help users
understand what is
being sent around the
network at the time.
Penetration Testing
Tests performed under a
controlled environment by a
qualified person
Checks for current vulnerabilities and explores
potential ones in order to expose weaknesses in
the system so they cannot be maliciously
exploited.