100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Ensayo

Unit 32: Networked Systems Security { P1 P2 M1 }

Puntuación
-
Vendido
2
Páginas
8
Grado
A+
Subido en
02-03-2021
Escrito en
2020/2021

P1 describe how networks can be attacked P2 describe how networked systems can be protected M1 explain the operation of different intruder detection systems

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
2 de marzo de 2021
Número de páginas
8
Escrito en
2020/2021
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
A+

Temas

Vista previa del contenido

Unit 32: Network System Security


P1: Describe how networks can be attacked


Denial of Service (DOS)
Denial of service is a malicious attack that is attempt to
bring down a network or server by flooding it with too
much traffic. DOS uses a computer and internet
connection to flood server to overload the resources.
However, DOS prevents users from accessing their
network or website when it is being attack, this means
the website will not be able to use and causes outage to
the network. DOS will impact the organization plenty of
money because resources and time is wasted fixing the
server for the customers.

Spoofing
Spoofing is an attack against a network using denial
of service where hackers pretend to be another user
on a network. Hackers provides false information to
hide user’s identity to gain advantage and it will be
difficult to trace the attack as it will be by another
network. Spoofing will impact the organization a lot
of money because their network will be down and
many resources will be wasted trying to look for the
hacker as it is hard to trace the IP address.

Virus
Virus is the most common threat to system security
and can be easily spread to computers and
networks. Virus is a malicious code that can cause
damage to the users’ data and system resource.
Virus can also slow down your computer and gain
personal information. Virus can be spread from an
email attachment, by using a USB stick to transfer
the virus into a computer and downloading
documents from the internet. For example, clicking a
link that was send from an email, the link will
download software without user realizing it.

, Spyware
Spyware is a malicious software that secretly records
user’s computer and what they do without their
knowledge or permission. It can scan the users monitor
and keep track on their activity and gather information
such as email address, passwords emails and credit card
information. It attacks the network through hidden
software and email attachments. Hackers can also scan
documents on the hard drive and monitor the keystrokes
using spyware.

Adware
Adware is a software that tracks the website that you visit
and shows unwanted advertisements where allows the
author to get money. It shows advertisement depending
on the websites you visited most and relates the
advertisement. Adware attacks the network when users
click on the advertisement and it gets automatically
downloaded for the users. The apps can be easily deleted
and it is not harmful.


Trojan and back door
A backdoor trojan is an application that is hidden in the
program. It seems like a useful application but it is
dangerous and it can damage your computer when it is run.
For example, the hacker will upload an application called
“call of duty” in the internet and within the application the
hacker will attach a backdoor trojan. When users download
the application from the internet and runs it, the computer
will be infected and the hacker can access to many more
computers. The trojan creates a backdoor by unlocking the
computer ports without realizing, the hacker then gain
access to the computer.

Brute force attack
Brute force attack is a cyberattack that is used when
encryption system fault cannot be found. The attack is
reliable and simple as attackers lets the computer to do it
work such as trying to break into an account by trying
different combination of passwords and usernames until it
works. Attackers tries every combination as possible by
changing the characters, numbers, methods and letters.
When attackers have access into the user’s network, it’s
difficult to catch the attacker.
$6.88
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
jessykaur Staffordshire University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
31
Miembro desde
4 año
Número de seguidores
23
Documentos
36
Última venta
1 año hace

2.3

12 reseñas

5
2
4
0
3
2
2
3
1
5

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes