Threats and Prevention
NETWORK SECURITY
This page covers threats to network security, including malware and social engineering, and the strategies used to prevent cybercrime.
Threats to Network Security
The methods attackers use to harm systems, gain unauthorised access, or manipulate users into compromising their own security.
Malware
Software designed to harm, disrupt, or gain unauthorised access to a computer system.
Trojans
A type of malware that disguises itself as legitimate software to trick users into installing it, allowing attackers to access the system.
Social Engineering
Techniques used to manipulate or trick people into revealing confidential information or performing actions that compromise security.
Security Strategies
Tools and measures used to prevent cybercrime, protect data, and control who can access network systems.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on security rules, acting as a barrier between trusted and untrusted networks.
Virtual Private Networks (VPNs)
A VPN is an encrypted connection over the internet from a device to a network. It helps sensitive data travel safely, prevents unauthorised people from eavesdropping, and allows remote work.
Encryption
The process of converting data into a coded form so that only authorised users can understand it.
2FA
A security process that requires users to provide two different forms of identification, such as a password and a one-time code.