P1 describe how networks can be attacked
P2 describe how networked systems can be protected
M1 explain the operation of different intruder detection systems
p2 describe how networked systems can be protected
m1 explain the operation of different intruder detection systems
Written for
BTEC
PEARSON (PEARSON)
Computer Science
Unit 32: Networked Systems Security
All documents for this subject (7)
Seller
Follow
jessykaur
Reviews received
Content preview
Unit 32: Network System Security
P1: Describe how networks can be attacked
Denial of Service (DOS)
Denial of service is a malicious attack that is attempt to
bring down a network or server by flooding it with too
much traffic. DOS uses a computer and internet
connection to flood server to overload the resources.
However, DOS prevents users from accessing their
network or website when it is being attack, this means
the website will not be able to use and causes outage to
the network. DOS will impact the organization plenty of
money because resources and time is wasted fixing the
server for the customers.
Spoofing
Spoofing is an attack against a network using denial
of service where hackers pretend to be another user
on a network. Hackers provides false information to
hide user’s identity to gain advantage and it will be
difficult to trace the attack as it will be by another
network. Spoofing will impact the organization a lot
of money because their network will be down and
many resources will be wasted trying to look for the
hacker as it is hard to trace the IP address.
Virus
Virus is the most common threat to system security
and can be easily spread to computers and
networks. Virus is a malicious code that can cause
damage to the users’ data and system resource.
Virus can also slow down your computer and gain
personal information. Virus can be spread from an
email attachment, by using a USB stick to transfer
the virus into a computer and downloading
documents from the internet. For example, clicking a
link that was send from an email, the link will
download software without user realizing it.
, Spyware
Spyware is a malicious software that secretly records
user’s computer and what they do without their
knowledge or permission. It can scan the users monitor
and keep track on their activity and gather information
such as email address, passwords emails and credit card
information. It attacks the network through hidden
software and email attachments. Hackers can also scan
documents on the hard drive and monitor the keystrokes
using spyware.
Adware
Adware is a software that tracks the website that you visit
and shows unwanted advertisements where allows the
author to get money. It shows advertisement depending
on the websites you visited most and relates the
advertisement. Adware attacks the network when users
click on the advertisement and it gets automatically
downloaded for the users. The apps can be easily deleted
and it is not harmful.
Trojan and back door
A backdoor trojan is an application that is hidden in the
program. It seems like a useful application but it is
dangerous and it can damage your computer when it is run.
For example, the hacker will upload an application called
“call of duty” in the internet and within the application the
hacker will attach a backdoor trojan. When users download
the application from the internet and runs it, the computer
will be infected and the hacker can access to many more
computers. The trojan creates a backdoor by unlocking the
computer ports without realizing, the hacker then gain
access to the computer.
Brute force attack
Brute force attack is a cyberattack that is used when
encryption system fault cannot be found. The attack is
reliable and simple as attackers lets the computer to do it
work such as trying to break into an account by trying
different combination of passwords and usernames until it
works. Attackers tries every combination as possible by
changing the characters, numbers, methods and letters.
When attackers have access into the user’s network, it’s
difficult to catch the attacker.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jessykaur. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.44. You're not tied to anything after your purchase.