Threats to networks
networkA group of interconnected computers/devices. can be hacked using a variety of techniques. These include:
- malwareSoftware that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details.
- phishingAn attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details.
- brute force
- DoS attackAn attack designed to render online services inaccessible. One type of this attack involves many computers simultaneously flooding a target with network traffic.
- data interception and theft
- SQLStructured query language - a programming language used to control databases. injection
- poor network policyA policy that provides rules and guidelines on what network users can and cannot do.
- people
Malware
Malware is malicious softwareThe programs, applications and data in a computer system. Any parts of a computer system that aren't physical. that is designed to hackingGaining unauthorised access to a computer. a system. Malware can take many different forms.
| Malware threat | Description |
| Viruses | Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data. |
| Worms | Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails. |
| Trojans | Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program. |
| Spyware | Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker. |
| Ransomware | Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid. |
| Malware threat | Viruses |
|---|---|
| Description | Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data. |
| Malware threat | Worms |
|---|---|
| Description | Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails. |
| Malware threat | Trojans |
|---|---|
| Description | Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program. |
| Malware threat | Spyware |
|---|---|
| Description | Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker. |
| Malware threat | Ransomware |
|---|---|
| Description | Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid. |