Network Vulnerabilities

Description

by rebecca
odd sockz
Mind Map by odd sockz, updated more than 1 year ago
odd sockz
Created by odd sockz over 6 years ago
7
0

Resource summary

Network Vulnerabilities
  1. Malware
    1. Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of harmful or intrusive software. including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
    2. Ransomware
      1. is designed to infect a user's system and encrypt the data.
      2. Phishing
        1. Phishing scams are attempts by scammers to trick you into giving out personal information such as your bank account numbers, passwords and credit card numbers.
        2. Trojan horse
          1. In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy
          2. Brute Force Attack
            1. Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
            2. Denial of Service
              1. In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
              2. Man in the Middle
                1. a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances.
                  1. Eavesdropping
                    1. microphones—some even crack open their computers and phones to disable or remove those audio components so they can't be hijacked by hackers. Now one group of Israeli researchers has taken that game of spy-versus-spy paranoia a step further, with malware that converts your headphones into makeshift microphones that can slyly record your conversations.
                    2. Message tampering
                      1. Is where a person will tamper and change the context of eaither an email or text message.They will also find out things about you or send corrupted messages.
                    3. Social Engineering
                      1. Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
                      2. Data Interception
                        1. When packets travel across a network, they are susceptible to being read, altered, or “hijacked.” Hijacking occurs when a hostile party intercepts a network traffic session and poses as one of the session endpoints. An attacker monitors data streams to or from a target, in order to gather sensitive information.
                        2. Packet Sniffing
                          1. A sniffer is an application that can capture network packets. Sniffers are also known as network protocol analizers. While protocol analyzers are really network troubleshooting tools, they are also used by hackers for hacking network. ... Once the packet is captured using a sniffer, the contents of packets can be analyzed.
                          2. SQL Injection
                            1. SQL (pronounced “sequel”) stands for structured query language; it’s a programming language used to communicate with databases. Many of the servers that store critical data for websites and services use SQL to manage the data in their databases. A SQL injection attack specifically targets this kind of server, using malicious code to get the server to divulge information it normally wouldn’t. This is especially problematic if the server stores private customer information from the website, such as credit card numbers, usernames and passwords (credentials), or other personally identifiable information, which are tempting and lucrative targets for an attacker.
                              1. An SQL injection attack works by exploiting any one of the known SQL vulnerabilities that allow the SQL server to run malicious code. For example, if a SQL server is vulnerable to an injection attack, it may be possible for an attacker to go to a website's search box and type in code that would force the site's SQL server to dump all of its stored usernames and passwords for the site.
                            2. How can it be provented?
                              1. You can prevent a trojan horse by only dowloading 100% safe softwere from a trusted/protected source.which includes all files downloaded from peer-to-peer programs or websites. But this is rarely possible in today's interconnected world, so a few more specific security measures are called for.
                                1. Make sure all your softwere is up to date. Especialy your antivirus and fire wall
                                  1. Update your operating system, browsers, and plugins.
                                    1. Use firewall, antivirus, anti-malware, and anti-exploit technology
                                  2. use a brand-name antivirus software
                                    1. Update your operating system, browsers, and plugins.
                                      1. Remove software you don’t use
                                        1. Read emails with an eagle eye.
                                          1. Do not call fake tech support numbers.
                                            1. Use strong passwords and/or password managers also Log out of websites after you’re done.
                                              1. Make sure you’re on a secure connection.
                                                1. Anti-Malware Software
                                                  1. Anti malware software protects against infections caused by many types of malware, including viruses, worms, Trojan horses, rootkits, spyware, keyloggers, ransomware and adware
                                                  2. Firewall
                                                    1. It is a network security system that monitors and controles incoming and outgoing network traffic.
                                                    2. User Access Levels
                                                      1. Part of an access control procedure for computer systems, which allows a system administrator to set up a hierarchy of users. So, the low level users can access only a limited set of information, whereas the highest level users can access the most sensitive data on the system
                                                      2. Password Strength Checker
                                                        1. A passwork checker checks how strong a password is.The password strengh meter checks for sequenses of characters being such as 12345 or 67890.It also makes sure you use a combination of symbols,numbers and letters the stronger the password the better.
                                                        2. Data Encryption
                                                          1. The Data Encryption Standard is a symmetric-key algorithm for the encryption of electronic data
                                                          2. penetration test
                                                            1. A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.
                                                            2. Network Forensics
                                                              1. Database forensics is a branch of digital forensic science relating to the forensic study of databases and their related metadata. The discipline is similar to computer forensics, following the normal forensic process and applying investigative techniques to database contents and metadata.
                                                              2. Network Security Policies
                                                                1. A network security policy, or NSP, is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee.
                                                              Show full summary Hide full summary

                                                              Similar

                                                              Computing Hardware - CPU and Memory
                                                              ollietablet123
                                                              SFDC App Builder 2
                                                              Parker Webb-Mitchell
                                                              Data Types
                                                              Jacob Sedore
                                                              Intake7 BIM L1
                                                              Stanley Chia
                                                              Software Processes
                                                              Nurul Aiman Abdu
                                                              Design Patterns
                                                              Erica Solum
                                                              CCNA Answers – CCNA Exam
                                                              Abdul Demir
                                                              Abstraction
                                                              Shannon Anderson-Rush
                                                              Spyware
                                                              Sam2
                                                              HTTPS explained with Carrier Pigeons
                                                              Shannon Anderson-Rush
                                                              Data Analytics
                                                              anelvr