Network security - OCROther threats

Networks operate on the principles of communication and sharing. Unfortunately, these principles mean that network traffic and data can be more easily subject to access by people who have no authority to do so.

Part ofComputer ScienceComputer systems

Other threats

As well as malware, other things can threaten a network, including the people using it.

Other threatsDescriptionPurpose of the attack
Brute force attacksWhere a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.To gain access to a system to modify or take data.
Denial of service (DOS) attacksWhere a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests.To cause disruption to a website. Could be a targeted attack to cause the website server to fail at a specific point. Could lead to reputation damage and financial losses for the website owner.
Data interception and theftWhere data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.To gain access to the transmitted data. Data could then be used by the hacker to commit further crimes.
The concept of structured query language (SQL) injectionWhere SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.The attack could cause the website to shut down while it is fixed, or could gain access to data store on the website such as customer data.
PeopleWhere users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses.Whilst this behaviour can be unintentional, it can increase the chances of a network being compromised and its data being accessed by unauthorised users. See social engineering.
Social engineeringSocial engineering is when a scammer tricks the user into providing information such as username and passwords. One possible way is to use an email that try to trick users into giving away personal details, known as phishing. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank.The phishing email could lead to a fake website designed to catch data such as bank account numbers and security codes.
Other threatsBrute force attacks
DescriptionWhere a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.
Purpose of the attackTo gain access to a system to modify or take data.
Other threatsDenial of service (DOS) attacks
DescriptionWhere a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests.
Purpose of the attackTo cause disruption to a website. Could be a targeted attack to cause the website server to fail at a specific point. Could lead to reputation damage and financial losses for the website owner.
Other threatsData interception and theft
DescriptionWhere data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.
Purpose of the attackTo gain access to the transmitted data. Data could then be used by the hacker to commit further crimes.
Other threatsThe concept of structured query language (SQL) injection
DescriptionWhere SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.
Purpose of the attackThe attack could cause the website to shut down while it is fixed, or could gain access to data store on the website such as customer data.
Other threatsPeople
DescriptionWhere users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses.
Purpose of the attackWhilst this behaviour can be unintentional, it can increase the chances of a network being compromised and its data being accessed by unauthorised users. See social engineering.
Other threatsSocial engineering
DescriptionSocial engineering is when a scammer tricks the user into providing information such as username and passwords. One possible way is to use an email that try to trick users into giving away personal details, known as phishing. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank.
Purpose of the attackThe phishing email could lead to a fake website designed to catch data such as bank account numbers and security codes.

Poor network policies are where a network does not have security rules in place for users to follow.

Poor network policies tend not to have:

  • levels of access to prevent users from accessing sensitive data unless they are authorised to do so
  • rules preventing the connection of external devices such as USB memory sticks which may contain and transmit
  • regulation regarding secure passwords, for example using a number of letters, numbers and symbols
  • rules to govern what websites can and cannot be visited
  • methods to prevent any user wirelessly connecting an unsecured laptop, tablet or smartphone
  • controls on what facilities can be accessed remotely (away from the organisation)
  • a formal backup procedure that is adhered to
  • a regular maintenance programme that is followed

A network manager must attempt to prevent and thwart all these types of threat, and remain aware of new threats as they emerge.