Network Design Security - Project
Network Design Security - Project
Malware
Malware refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and
computers systems. Examples of common malware include viruses, worms , Trojan viruses, spyware, adware, and
ransomware.
Phishing attack
Phishing is a type of cybersecurity attack in which malicious actors send messages pretending to be a trusted person or
entity. Phishing messages manipulate a user into taking actions such as installing a malicious file, clicking on a malicious link,
or disclosing sensitive information such as login credentials. Phishing is the most common type of social engineering, a
general term describing attempts to manipulate or deceive computer users.
SQL injection
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application
makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might
include data belonging to other users, or any other data that the application itself is able to access.
Risk management plan
Threats Risk control measures Risk ranking (1-5) where 1= lowest and
5 = highest
3. Auditing procedure
- Testing for any security flaws the company.
- Checking if all the security as per the legislation or not.
CONCLUSION
New security design were created with the implementation of the security development plan taking into account all
potential threats to the system and how to mitigate them with the help of this network security plan data security,
and network performance were both quaranteed. Additionally, it was ensured that no threats or vulnerabilities that
may disrupt the network would enter the system.
Thank You