100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 32: Networked Systems Security { P1 P2 M1 } £4.99   Add to cart

Essay

Unit 32: Networked Systems Security { P1 P2 M1 }

 182 views  2 purchases

P1 describe how networks can be attacked P2 describe how networked systems can be protected M1 explain the operation of different intruder detection systems

Preview 2 out of 8  pages

  • March 2, 2021
  • 8
  • 2020/2021
  • Essay
  • Unknown
  • A+
All documents for this subject (7)
avatar-seller
jessykaur
Unit 32: Network System Security


P1: Describe how networks can be attacked


Denial of Service (DOS)
Denial of service is a malicious attack that is attempt to
bring down a network or server by flooding it with too
much traffic. DOS uses a computer and internet
connection to flood server to overload the resources.
However, DOS prevents users from accessing their
network or website when it is being attack, this means
the website will not be able to use and causes outage to
the network. DOS will impact the organization plenty of
money because resources and time is wasted fixing the
server for the customers.

Spoofing
Spoofing is an attack against a network using denial
of service where hackers pretend to be another user
on a network. Hackers provides false information to
hide user’s identity to gain advantage and it will be
difficult to trace the attack as it will be by another
network. Spoofing will impact the organization a lot
of money because their network will be down and
many resources will be wasted trying to look for the
hacker as it is hard to trace the IP address.

Virus
Virus is the most common threat to system security
and can be easily spread to computers and
networks. Virus is a malicious code that can cause
damage to the users’ data and system resource.
Virus can also slow down your computer and gain
personal information. Virus can be spread from an
email attachment, by using a USB stick to transfer
the virus into a computer and downloading
documents from the internet. For example, clicking a
link that was send from an email, the link will
download software without user realizing it.

, Spyware
Spyware is a malicious software that secretly records
user’s computer and what they do without their
knowledge or permission. It can scan the users monitor
and keep track on their activity and gather information
such as email address, passwords emails and credit card
information. It attacks the network through hidden
software and email attachments. Hackers can also scan
documents on the hard drive and monitor the keystrokes
using spyware.

Adware
Adware is a software that tracks the website that you visit
and shows unwanted advertisements where allows the
author to get money. It shows advertisement depending
on the websites you visited most and relates the
advertisement. Adware attacks the network when users
click on the advertisement and it gets automatically
downloaded for the users. The apps can be easily deleted
and it is not harmful.


Trojan and back door
A backdoor trojan is an application that is hidden in the
program. It seems like a useful application but it is
dangerous and it can damage your computer when it is run.
For example, the hacker will upload an application called
“call of duty” in the internet and within the application the
hacker will attach a backdoor trojan. When users download
the application from the internet and runs it, the computer
will be infected and the hacker can access to many more
computers. The trojan creates a backdoor by unlocking the
computer ports without realizing, the hacker then gain
access to the computer.

Brute force attack
Brute force attack is a cyberattack that is used when
encryption system fault cannot be found. The attack is
reliable and simple as attackers lets the computer to do it
work such as trying to break into an account by trying
different combination of passwords and usernames until it
works. Attackers tries every combination as possible by
changing the characters, numbers, methods and letters.
When attackers have access into the user’s network, it’s
difficult to catch the attacker.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jessykaur. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £4.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£4.99  2x  sold
  • (0)
  Add to cart