100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Essay

Unit 32: Networked Systems Security { P1 P2 M1 }

Beoordeling
-
Verkocht
2
Pagina's
8
Cijfer
A+
Geüpload op
02-03-2021
Geschreven in
2020/2021

P1 describe how networks can be attacked P2 describe how networked systems can be protected M1 explain the operation of different intruder detection systems

Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
2 maart 2021
Aantal pagina's
8
Geschreven in
2020/2021
Type
Essay
Docent(en)
Onbekend
Cijfer
A+

Onderwerpen

Voorbeeld van de inhoud

Unit 32: Network System Security


P1: Describe how networks can be attacked


Denial of Service (DOS)
Denial of service is a malicious attack that is attempt to
bring down a network or server by flooding it with too
much traffic. DOS uses a computer and internet
connection to flood server to overload the resources.
However, DOS prevents users from accessing their
network or website when it is being attack, this means
the website will not be able to use and causes outage to
the network. DOS will impact the organization plenty of
money because resources and time is wasted fixing the
server for the customers.

Spoofing
Spoofing is an attack against a network using denial
of service where hackers pretend to be another user
on a network. Hackers provides false information to
hide user’s identity to gain advantage and it will be
difficult to trace the attack as it will be by another
network. Spoofing will impact the organization a lot
of money because their network will be down and
many resources will be wasted trying to look for the
hacker as it is hard to trace the IP address.

Virus
Virus is the most common threat to system security
and can be easily spread to computers and
networks. Virus is a malicious code that can cause
damage to the users’ data and system resource.
Virus can also slow down your computer and gain
personal information. Virus can be spread from an
email attachment, by using a USB stick to transfer
the virus into a computer and downloading
documents from the internet. For example, clicking a
link that was send from an email, the link will
download software without user realizing it.

, Spyware
Spyware is a malicious software that secretly records
user’s computer and what they do without their
knowledge or permission. It can scan the users monitor
and keep track on their activity and gather information
such as email address, passwords emails and credit card
information. It attacks the network through hidden
software and email attachments. Hackers can also scan
documents on the hard drive and monitor the keystrokes
using spyware.

Adware
Adware is a software that tracks the website that you visit
and shows unwanted advertisements where allows the
author to get money. It shows advertisement depending
on the websites you visited most and relates the
advertisement. Adware attacks the network when users
click on the advertisement and it gets automatically
downloaded for the users. The apps can be easily deleted
and it is not harmful.


Trojan and back door
A backdoor trojan is an application that is hidden in the
program. It seems like a useful application but it is
dangerous and it can damage your computer when it is run.
For example, the hacker will upload an application called
“call of duty” in the internet and within the application the
hacker will attach a backdoor trojan. When users download
the application from the internet and runs it, the computer
will be infected and the hacker can access to many more
computers. The trojan creates a backdoor by unlocking the
computer ports without realizing, the hacker then gain
access to the computer.

Brute force attack
Brute force attack is a cyberattack that is used when
encryption system fault cannot be found. The attack is
reliable and simple as attackers lets the computer to do it
work such as trying to break into an account by trying
different combination of passwords and usernames until it
works. Attackers tries every combination as possible by
changing the characters, numbers, methods and letters.
When attackers have access into the user’s network, it’s
difficult to catch the attacker.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
jessykaur Staffordshire University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
31
Lid sinds
4 jaar
Aantal volgers
23
Documenten
36
Laatst verkocht
1 jaar geleden

2,3

12 beoordelingen

5
2
4
0
3
2
2
3
1
5

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen