sending emails pretending to be a reputable company to gain personal information.
Prevention: looking into domain names and/or downloading the latest version of your browser
1 of 6
Types of threats: Social Engineering
tricking others to break security procedures to get into a network
2 of 6
Types of threats: Brute-force attacks & Prevention
someone by trying access a network by cracking the logo details. By trial and error or by using automated software to generate possibilities
Prevention: having a limit on how many times you can attempt to log-in. Also making the login more complex - less
3 of 6
Types of threats: Data interception and theft & Prevention
When data packets are monitored, to look for sensitive data - found by "pocket sniffers."
Prevention: using VPN to send sensitive data preventing packet sniffers from analysing the data
4 of 6
Types of threats: SQL Injection "Structured Query Language"
a security exploit, when a attacker adds SQL to a Web form input box to gain unauthorised resources to make changes to sensitive data
5 of 6
Types of threats: Poor Network Policy
Networks are more likely to be under threat if an organisation doesn't regularly test it for security issues and loopholes. Meaning the network can be exploited before it can be fixed
6 of 6
Other cards in this set
Card 2
Front
Types of threats: Social Engineering
Back
tricking others to break security procedures to get into a network
Card 3
Front
Types of threats: Brute-force attacks & Prevention
Back
Card 4
Front
Types of threats: Data interception and theft & Prevention
Back
Card 5
Front
Types of threats: SQL Injection "Structured Query Language"
Comments
No comments have yet been made