Back to 课程

Computer Science GCES EDEXCEL

0% Complete
0/0 Steps
  1. Decomposition And Abstraction Edexcel
    2 主题
  2. Algorithms Edexcel
    11 主题
  3. Truth Tables Edexcel
    3 主题
  4. Binary Edexcel
    6 主题
  5. Data Representation Edexcel
    4 主题
  6. Data Storage And Compression Edexcel
    2 主题
  7. Hardware Edexcel
    5 主题
  8. Software Edexcel
    3 主题
  9. Programming Languages Edexcel
    2 主题
  10. Networks Edexcel
    7 主题
  11. Network Security Edexcel
    2 主题
  12. Environmental Issues Edexcel
    1 主题
  13. Ethical And Legal Issues Edexcel
    3 主题
  14. Cybersecurity Edexcel
    2 主题
  15. Develop Code Edexcel
    6 主题
  16. Constructs Edexcel
    4 主题
  17. Data Types And Data Structures Edexcel
    5 主题
  18. Operators Edexcel
    1 主题
  19. Subprograms Edexcel
    2 主题
课 Progress
0% Complete

Exam code:1CP2

What is network security?

  • Network security is any activity designed to protect a network and it’s data from internal and external threats

  • A network vulnerability is a weakness that can be exploited by a criminal to gain unauthorised access to information or resources

Identifying Network Vulnerabilities

What are common network vulnerabilities?

  • Examples of common network vulnerabilities are:

    • Weak passwords

    • Outdated software

    • Malware

    • Poorly configured firewalls

Weak passwords

  • A week password is a password with less than 8-12 characters and does not contain a combination of:

    • Upper case characters

    • Lower case characters

    • Numbers

    • Special characters (*, #. ! etc.)

  • Predictable patterns make a weak password, for example, using birthdays, names and/or keyboard patterns (qwerty)

  • Weak passwords can lead to hackers deploying brute force attacks, which can lead to:

    • Data theft

    • Access to private information

    • Further attacks

Outdated software

  • Outdated software is software that has not been patched or updated regularly

  • Outdated software can lead to hackers exploiting vulnerabilities in source code

Malware

  • Malware is malicious software designed to cause harm to a network or computer system

  • Examples of issues that malware can cause are:

    • File deletion/corruption

    • Use system resources – slow down performance/internet

    • Logging key strokes

Poorly configured firewalls

  • A firewall is designed to monitor incoming and outgoing traffic from a network

  • A poorly configured firewall can lead to malicious software getting in or cause it to spread

Penetration Testing & Ethical Hacking

What is penetration testing?

  • Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access

  • A company will employ penetration testers to test a networks security and use any information gained to to fix any issues that are found

  • There are two main types of penetration testing:

    • Internal (white-box)

    • External (black-box)

Internal (white-box)

  • When the person or team testing the system has knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system

External (black-box)

  • When the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system

What is ethical hacking?

  • Ethical hacking is attempting to gain unauthorised access to a network or computer system with the intention of helping to fix any vulnerabilities

  • Ethical hackers have permission from the system owner

  • There are 3 categories of hackers:

White-hat hackers

Grey-hat hackers

Black-hat hackers

  • Security experts

  • Employed to carry out white-box/black-box testing

  • Ethical hackers

  • Not employed to carry out testing

  • Technically illegal

  • Any vulnerabilities are reported so they can be fixed

  • Criminals

  • Tries to gain unauthorised access with intent to cause harm

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注