Network security - OCRThreats to networks

Networks operate on the principles of communication and sharing. Unfortunately, these principles mean that network traffic and data can be more easily subject to access by people who have no authority to do so.

Part ofComputer ScienceComputer systems

Threats to networks

can be hacked using a variety of techniques. These include:

  • brute force
  • data interception and theft
  • injection
  • poor
  • people

Malware

Malware is malicious that is designed to a system. Malware can take many different forms.

The different forms of malware including worms, viruses, spyware, Trojans and ransomware
Malware threatDescription
VirusesPrograms embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
WormsPrograms similar to viruses except that they are not hidden within other files. Worms often spread through emails.
TrojansPrograms which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
SpywarePrograms that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
RansomwarePrograms that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
Malware threatViruses
DescriptionPrograms embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
Malware threatWorms
DescriptionPrograms similar to viruses except that they are not hidden within other files. Worms often spread through emails.
Malware threatTrojans
DescriptionPrograms which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
Malware threatSpyware
DescriptionPrograms that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
Malware threatRansomware
DescriptionPrograms that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.