Network security, its challenges and solutions

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
Network security, its challenges and solutions Door Mind Map: Network security, its challenges and solutions

1. Threats to Network Security

1.1. Vulnerability

1.1.1. various devices (servers, PCs, routers)

1.2. Threats

1.2.1. Unstructured threats

1.2.2. Structured threats

1.2.3. External threats

1.2.4. Internal threats

2. Groups of people (who pose threats)

2.1. Hacker

2.1.1. a person who tries to access network resources with malicious intent.

2.2. Cracker

2.2.1. attempts to gain unauthorized access to network resources

2.3. Phreaker

2.3.1. manipulates the telephone network

2.3.1.1. the goal is to penetrate the telephone network to make free long-distance calls.

2.4. Spammer

2.4.1. use viruses to take control of home computers

2.5. Phisher

2.5.1. uses email to steal confidential information

2.6. White hat

2.6.1. use their abilities to find vulnerabilities in systems or networks

2.6.1.1. report these vulnerabilities to system owners so that they can be fixed

2.7. Black hat

2.7.1. use their knowledge of computer systems to hack into systems or networks

3. Attacks

3.1. System access

3.2. Denial of service (DoS)

3.3. Malicious software

3.4. Trojan horses

4. The Most Devastating Cyber Attacks of 2022

4.1. Crypto Theft

4.2. Microsoft Data Breach

4.3. News Corp Server Breach

4.4. Red Cross Data Breach

4.5. Ronin Crypto Theft

4.5.1. theft due to a change in security protocol

4.6. Cash App Data Breach

4.6.1. A lot of sensitive financial information was stolen in the hack.