Network Security: Forms of Attacks Network Threats Securing a Network Expert Level - Check My Answers
Anti-malware software
Software designed to identify and remove malware and hence stop malware from damaging a computer network.
A network device used to prevent hackers from accessing a network.
User Access Levels
Are used to control which files or area of a network different groups of user can access.
Authentication using Strong Passwords
A method of identification of a user on a computer system (e.g. username and password, biometrics such as fingerprints).
When data is encoded (encrypted) and can only be decoded by computers with the correct decryption key.
Network forensics
Investigations undertaken by an organisation to find the cause and source of an attack on their network.
Penetration Testing
The process of simulating attacks on a network to identify weaknesses.
Network Policies
A set of rules and procedures members of an organisation are asked to follow to ensure their network remain secure.