Syllabus Detail Draft
- Strategies to compromise security of networks including; denial of service, back doors, IP spoofing and phishing 12 ATAR
Background
- Networks are so popular these days; whether a website or storage data for a company, business or individual.
- There are many attractive items on networks that hackers and other criminals try to get, such as bank accounts, government contract information, identity theft details and lots more.
- Read below to see how networks can be at risk.
Denial of Service (DoS)
- This is an attack on a network IP address with a flood of traffic which stops normal traffic on that website.
- The Australian Bureau of Statistics was flooded by this type of attack in 2016
Back Doors
- Is a method of getting into a network without authentication.
- A software developer may create a backdoor in software for troubleshooting.
- Hackers can find these back doors and gain entry into the network.
- Hackers can then install malware, or programs that can access important data.
IP Spoofing
- Is a way of getting into a network by changing the IP details in a packet of data.
- It is called spoofing because it uses trickery to get in.
- By changing the IP address details they can hide their identity.
- They can use this to launch Denial of Service attacks.
Phishing
- This is sending a link in an email to trick the person into going to a fake website.
- At the fake website may be a login window asking for username and password.
- If you type this in, the hackers have got your username and password.
- There are many other types of phishing.
- They all try to get you to give some information. They are fishing for information :)
Found an error or have an enhancement? Please let us know via this contact form