Network security threats 3
- Created by: Tomiwaq
- Created on: 06-04-19 12:09
View mindmap
- Network security threats
- Network policy
- Regularly test the network to find and fix security weaknesses
- Use passwords to prevent unauthorised people from getting to the network
- Enforce user access levels
- Install anti-malware and firewall software to prevent attacks
- Encrypt sensitive data
- Penetration testing
- It is when a company employ specialists to simulate potential attacks
- Pentesting is used to identify possible weaknesses in a network's security
- Network forensics
- Investigations to find the cause of attacks on a network
- After the network is attacked, these packets can be analysed to discover how it happened
- Passwords
- Help prevent unauthorised users accessing the network
- Passwords should have many characters, combination of letters, numbers and symbols
- Should be changed frequently
- User access levels
- Control which parts of a network different users can access
- Helps limit the number of people with access to important data
- Anti-malware software
- Designed to fins and stop malware from damaging an organisation's network
- Companies use firewalls to block unauthorised access
- Firewalls examine all data entering and leaving the network
- Encryption
- When data is translated into a code which only someone with the correct key can access
- Encrypted text is called cipher text and when it has not been encrypted it is called plain text
- Encryption is essential for sending data over a network securely
- Network policy
Comments
Report