A network attack where the hacker attempts to change data or introduce a malware.
When a hacker monitors data travelling on a network (without changing the data).
A network attack which involves overloading a network with useless traffic to make the network slow or unresponsive.
When a hacker or automated software generates thousands of usernames/passwords to try to access a computer system.
A network attack performed by someone whithin the organisation, using their network access to steal or change information.
Malicious software created to damage or gain illegal access to a computer system. (e.g. Trojan Horse, virus, spyware etc.)
When someone sends an e-mail or text pretending to be a well-known business, asking the recipient to share their personal information (e.g account number, password).
Software designed to identify and remove malware and hence stop malware from damaging a computer network.
A network device used to prevent hackers from accessing a network.
Are used to control which files or area of a network different groups of user can access.
Authentication using Strong Passwords
A method of identification of a user on a computer system (e.g. username and password, biometrics such as fingerprints).
When data is encoded (encrypted) and can only be decoded by computers with the correct decryption key.
Investigations undertaken by an organisation to find the cause and source of an attack on their network.
The process of simulating attacks on a network to identify weaknesses.
Typing SQL code in an input box of a form to try to access or attack an SQL database.
Data Interception and Theft
The act of intercepting or stealing information from a computer system or from an electronic communication.
A way of gaining sensitive information or illegal access to a computer system or network by influencing people (usually employees of an organisation).
A set of rules and procedures members of an organisation are asked to follow to ensure their network remain secure.