Other threats
As well as malware, other things can threaten a network, including the people using it.
| Other threats | Description | Purpose of the attack |
| Brute force attacks | Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained. | To gain access to a system to modify or take data. |
| Denial of service (DOS) attacks | Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests. | To cause disruption to a website. Could be a targeted attack to cause the website server to fail at a specific point. Could lead to reputation damage and financial losses for the website owner. |
| Data interception and theft | Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker. | To gain access to the transmitted data. Data could then be used by the hacker to commit further crimes. |
| The concept of structured query language (SQL) injection | Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations. | The attack could cause the website to shut down while it is fixed, or could gain access to data store on the website such as customer data. |
| People | Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses. | Whilst this behaviour can be unintentional, it can increase the chances of a network being compromised and its data being accessed by unauthorised users. See social engineering. |
| Social engineering | Social engineering is when a scammer tricks the user into providing information such as username and passwords. One possible way is to use an email that try to trick users into giving away personal details, known as phishing. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. | The phishing email could lead to a fake website designed to catch data such as bank account numbers and security codes. |
| Other threats | Brute force attacks |
|---|---|
| Description | Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained. |
| Purpose of the attack | To gain access to a system to modify or take data. |
| Other threats | Denial of service (DOS) attacks |
|---|---|
| Description | Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests. |
| Purpose of the attack | To cause disruption to a website. Could be a targeted attack to cause the website server to fail at a specific point. Could lead to reputation damage and financial losses for the website owner. |
| Other threats | Data interception and theft |
|---|---|
| Description | Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker. |
| Purpose of the attack | To gain access to the transmitted data. Data could then be used by the hacker to commit further crimes. |
| Other threats | The concept of structured query language (SQL) injection |
|---|---|
| Description | Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations. |
| Purpose of the attack | The attack could cause the website to shut down while it is fixed, or could gain access to data store on the website such as customer data. |
| Other threats | People |
|---|---|
| Description | Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses. |
| Purpose of the attack | Whilst this behaviour can be unintentional, it can increase the chances of a network being compromised and its data being accessed by unauthorised users. See social engineering. |
| Other threats | Social engineering |
|---|---|
| Description | Social engineering is when a scammer tricks the user into providing information such as username and passwords. One possible way is to use an email that try to trick users into giving away personal details, known as phishing. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. |
| Purpose of the attack | The phishing email could lead to a fake website designed to catch data such as bank account numbers and security codes. |
Poor network policies are where a network does not have security rules in place for users to follow.
Poor network policies tend not to have:
- levels of access to prevent users from accessing sensitive data unless they are authorised to do so
- rules preventing the connection of external devices such as USB memory sticks which may contain and transmit virusAny computer program designed to replicate and damage other computer systems and software.
- regulation regarding secure passwords, for example using a number of letters, numbers and symbols
- rules to govern what websites can and cannot be visited
- methods to prevent any user wirelessly connecting an unsecured laptop, tablet or smartphone
- controls on what facilities can be accessed remotely (away from the organisation)
- a formal backup procedure that is adhered to
- a regular maintenance programme that is followed
A network manager must attempt to prevent and thwart all these types of threat, and remain aware of new threats as they emerge.