1.3 Network and Data Security
1.3 Network and Data Security
Email Protocols
Ethical hacking is carried out with the permission of the Viruses - A Program that is able to copy itself onto other
4 Main Security Risks
system owner to cover all computer attack techniques. programs often with the intention of damaging data. A
· Hacking, Viruses, Technical Breakdown & virus is transmitted by 'piggybacking' on another
Interception An ethical hacker attempts to bypass system security
program known as a 'vector'.
and search for any weak points that could be exploited
To Reduce Risks: by malicious hackers. This information is then used by Key Logger - Covert programs that capture keyboard
Antivirus Software the system owner to improve system security. inputs and transmits or stores this data for a
A program that can be loaded into memory when Penetration Testing hacker.
the computer is running. It monitors activity on a A sub-set of ethical hacking that deals with the process Worm - a standalone program that self-
computer for the signs of a virus. of testing a network/system to find vulnerabilities that replicates in order to spread to other
Firewalls an attacker could exploit. computers. It does not need a vector.
Software or hardware that controls Targeted - carried out by the organization's IT team and
Spyware - Installed by opening attachments or
the incoming & outgoing network the penetration testing team working together.
downloading infected software. Can be used to
traffic. Data is analysed to decide if it External - to find out if an outside attacker can get in collect stored data without the user’s knowledge.
should be allowed through or not. and how far they can get in once they have gained
access. Trojan Horse - appears to perform a useful
Access Levels function, but also provides a ‘backdoor’ that enables data to be
Internal - to estimate how much damage a dissatisfied
A method used to allow only certain users stolen.
employee could cause.
read and/or write access to data on a computer
Blind - to simulate the actions of a real attacker by
system.
severely limiting the information given to the team
Passwords performing the test. Other Threats
Used to prove a person’s identity to a
computer system, thus allowing SQL Injection - Malicious users can inject SQL commands into a
them access to relevant data. web page input form and compromise data held in a database.
Two-Factor (Double) Authentication DoS Attack - Denial of Service attacks attempt to make your
website and servers unavailable to real users, by swamping a
Users provide 2 forms of ID. Usually something they
system with fake requests.
know (pin) and something the have (bank card). Foot printing
Network Forensics Brute Force Attack - A hacking algorithm, which tries all possible
The first step in the evaluation of system combinations of lowercase and uppercase characters, numbers
This involves monitoring the traffic on a network. At security. It Involves gathering all available and symbols to gain unauthorised access to a computer system.
regular intervals transmitted data packets are copied. information about the computer system or
The copy and information about the packet are then network. Used to limit the technical information IP Address Spoofing - Changing the IP address of a real host so
stored for later analysis. about a system that is publicly available. that a visitor who types in the URL of a real site is taken to a
This is usually processed in batches. The information spoofed web page in order to steal personal details.
gathered can help identify invasive traffic (from
Social Engineering- Involves tricking a user into giving out sensitive
hackers) or to determine where data is being sent.
information such as a password. E.g. Phishing, (an attempt to get
users’ details using fake emails) & Pharming, where users are