Identifying and preventing vulnerabilities

<< Previous: Threats to computer systems and networks Next: Threats and vulnerabilities test >>

Protecting against malware

Anti-malware software is the primary defence against malware. It works because it has a database of known malware and scans your computer checking for the existence of these. Modern anti-malware also has a range of other protections such monitoring for suspicious app activity and giving alerts about potentially dangerous websites before user visit them. It is only as good as its last update as newer threats will not be identifiable.

Firewalls are another defence against malware. A firewall sits between a network and the internet and can be configured to say what type of data may enter from the internet and what may be sent out. This can prevent various types of malware from entering your system in the first place.

Protecting against social engineering

The primary defence against social engineering is training. It is the number one type of attack against computer systems and networks and only increasing in frequency and sophistication. Consistent policies should be laid out for all types of communication.

Protecting against brute force attacks

Having a set number of attempts to log in before locking your account is one basic step organisations take to protect against brute force attacks. The use two factor authentication or biometrics can further limit the ability of hackers to use a brute force attack. In addition it is essential firms enforce good password practices such as:

Preventing DOS and DDOS attacks

A DOS attack might be able to be countered by blocking the IP address from which the data flooding the network is coming. A DDOS attack is harder to stop as the data flooding the network comes from large numbers of computers. One method used is CAPTCHAs which try to ensure requests are coming from humans. There are also professional companies, like Cloudflare, that provide DDOS protection as a service.

Preventing data interception and theft

Encryption is the key tool to prevent data interception and theft. If data is encrypted then even if it is intercepted it will be meaningless.
User access levels can mean that only the right people can access certain valuable information reducing the risk of sensitive data being stolen.
Suitable physical security such as locks on doors and cameras can help prevent people accessing the network undetected.

Preventing SQL injection

There are some basic steps that can be taken when programming web forms to avoid the possibility of SQL injection. The essence is to limit the requests that can be made of the database and filter any inputs for SQL.

Penetration testing

Penetration testing is where an organisation pays someone to attack their network and report back on the vulnerabilities they find. There are two primary methods used:

Knowledge check


Questions:
Correct:

Question text


<< Previous: Threats to computer systems and networks Next: Threats and vulnerabilities test >>

© All materials created by and copyright S.Goff