Malware - Malicious software designed to cause harm to someones data and hardware without them knowing it's installed, Virus - Attached to a file/download that can be spread and is activated when the user clicks on it, Worms - Self replicate and spread very quickly. They exploit weaknesses in network security., Trojan horse - Disguised as legitimate software and are installed without the user knowing., Spyware - Secretly monitors the users actions such as websites and usernames and passwords, Keylogger - Monitors the commonly used keys on the keyboards when entering passwords., Passive attacks - Someone monitors data packets travelling across networks and intercepts those data packets, Active attack - Someone attacks the network with malware, Insider attack - Someone inside the organisation exploits the network access to steal information., Brute force attack - Trying out a combination of different usernames and passwords to get into the network, Distributed Denial of Service attack (DDoS) - When the network/website is flooded with useless traffic with the aim to prevent users accessing it., Ransomware - Software designed to encrypt a users files/data where payment is to be made for the decryption/password key., Social engineering - Using people/employees as the weak point of the system by persuading/making them vulnerable to reveal sensitive information, Phishing - The use of emails where users are persuaded to click on it and enter their personal details but become victims of a scam., SQL - Structured Query Language - a programming language used to create/edit/delete tables and data in a database., SQL injection - Pieces of SQL code entered into a websites input box which could reveal sensitive information if not tested regularly.,

1.4 Network Security Attacks Part 1

Табло

Визуален стил

Опции

Шаблон за превключване

Възстановяване на авто-записаната: ?