Chapter 5

Types of threats - NOT Malware

?
Types of threats: Phishing & Prevention
sending emails pretending to be a reputable company to gain personal information.
Prevention: looking into domain names and/or downloading the latest version of your browser
1 of 6
Types of threats: Social Engineering
tricking others to break security procedures to get into a network
2 of 6
Types of threats: Brute-force attacks & Prevention
someone by trying access a network by cracking the logo details. By trial and error or by using automated software to generate possibilities
Prevention: having a limit on how many times you can attempt to log-in. Also making the login more complex - less
3 of 6
Types of threats: Data interception and theft & Prevention
When data packets are monitored, to look for sensitive data - found by "pocket sniffers."
Prevention: using VPN to send sensitive data preventing packet sniffers from analysing the data
4 of 6
Types of threats: SQL Injection "Structured Query Language"
a security exploit, when a attacker adds SQL to a Web form input box to gain unauthorised resources to make changes to sensitive data
5 of 6
Types of threats: Poor Network Policy
Networks are more likely to be under threat if an organisation doesn't regularly test it for security issues and loopholes. Meaning the network can be exploited before it can be fixed
6 of 6

Other cards in this set

Card 2

Front

Types of threats: Social Engineering

Back

tricking others to break security procedures to get into a network

Card 3

Front

Types of threats: Brute-force attacks & Prevention

Back

Preview of the front of card 3

Card 4

Front

Types of threats: Data interception and theft & Prevention

Back

Preview of the front of card 4

Card 5

Front

Types of threats: SQL Injection "Structured Query Language"

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Software resources »