Networks: Security Threats

Networks: Security Threats

Security Threats

Malware

  • Malware is a general term for malicious software designed to harm computers or networks.
  • Malware can take many forms, such as viruses, which can replicate and spread, worms, which can move through networks independently, or Trojans, which appear to be legitimate software but carry out malicious activities.

Phishing

  • Phishing is a technique where attackers try to trick people into revealing sensitive information, such as usernames, passwords, or credit card numbers.
  • This is usually done by pretending to be a trusted source, like a bank or popular website.
  • Phishing can happen through email, websites, or even phone calls.

Brute Force Attacks

  • In a brute force attack, an attacker tries to gain access by guessing passwords.
  • They often use software that automatically tries many different combinations in a short time.
  • Strong, unique passwords and security measures like two-factor authentication can help protect against brute force attacks.

Distributed Denial of Service (DDoS) attacks

  • A Distributed Denial of Service (DDoS) attack floods a network or website with so much traffic that it becomes unavailable to users.
  • The attacker typically uses a network of infected computers, known as a botnet, to generate the traffic.

Insider threats

  • An insider threat comes from someone within the organisation, such as an employee or contractor.
  • They might misuse their authorised access to harm the organisation, either intentionally or accidentally.

Data interception and theft

  • Data interception and theft involves unauthorised access to transmit or steal data.
  • This can happen on unsecure networks, through weak security practices, or by using malicious software.

Zero-day attacks

  • A zero-day attack is an attack that exploits a previously unknown vulnerability.
  • The name comes from the fact that the software developers have had zero days to fix the vulnerability.
  • These attacks can be particularly harmful, as they can go undetected until after damage has been done.

Remember: Awareness and strong security practices, like regularly updating software and using strong, unique passwords, can help to protect against these threats.