Monday, October 7, 2019

LO1: Network Security - Breaches

Activity:
Research network security - two examples of breaches and the outcomes of those breaches. How these could have been prevented.

Two breaches
1- Ransomware
- A type of malware designed to block access to the targeted computer system until a sum of money is paid.

Ransomware
It will kidnapped the data and ask for money, then they will return back the data.

How it occur - Ransomware
Most ransomware variants encrypt the files on the affected computer, making them inaccessible, and demand a ransom payment to restore access

How to prevent - Ransomware

- restore possible files
- do not pay the ransom
- do not provide personal information when answering an email or any other ways
- use reputable antivirus software and firewall
- make sure all systems are up-to-date
- Do employ content scanning and filtering on mail servers
- Before going to travel, do alert IT department


2- Password Attacks
- To identify password until they get the correct one
- To help human cracker/hackers to get the access to the resources/information.

Password attacks
The hacker will try many times to get the correct passwords, so they can steal information.

How it occur - Password attack
- Key logger attacks

                             Image result for key logger attacks


How to prevent - Password attacks
- create unique password that consist of symbol, number.


                        Image result for create unique password


References

Google.com. (2019). define ransomware - Google Search. [online] Available at: https://www.google.com/search?q=define+ransomware&oq=define+ransomware&aqs=chrome..69i57.5889j0j1&sourceid=chrome&ie=UTF-8 [Accessed 8 Oct. 2019].


SearchFinancialSecurity. (2019). What is password cracker? - Definition from WhatIs.com. [online] Available at: https://searchfinancialsecurity.techtarget.com/definition/password-cracker [Accessed 8 Oct. 2019].


Us.norton.com. (2019). 7 tips to prevent ransomware. [online] Available at: https://us.norton.com/internetsecurity-malware-7-tips-to-prevent-ransomware.html [Accessed 8 Oct. 2019].



No comments:

Post a Comment

Key considerations for planning and undertaking research

Determine what the key considerations are for planning and undertaking research. Research questions.  Certain research quest...