Networks and CommunicationsCommunication Media and Software, Network design and creation, connectivity standards, protocols, security, operating systems.

Syllabus Detail Draft

  • Strategies to compromise security of networks including; denial of service, back doors, IP spoofing and phishing 12 ATAR

Background

  • Networks are so popular these days; whether a website or storage data for a company, business or individual.
  • There are many attractive items on networks that hackers and other criminals try to get, such as bank accounts, government contract information, identity theft details and lots more.
  • Read below to see how networks can be at risk.

Denial of Service (DoS)

  • This is an attack on a network IP address with a flood of traffic which stops normal traffic on that website.
  • The Australian Bureau of Statistics was flooded by this type of attack in 2016

Back Doors

  • Is a method of getting into a network without authentication.
  • A software developer may create a backdoor in software for troubleshooting.
  • Hackers can find these back doors and gain entry into the network.
  • Hackers can then install malware, or programs that can access important data.

IP Spoofing

  • Is a way of getting into a network by changing the IP details in a packet of data.
  • It is called spoofing because it uses trickery to get in.
  • By changing the IP address details they can hide their identity.
  • They can use this to launch Denial of Service attacks.

Phishing

  • This is sending a link in an email to trick the person into going to a fake website.
  • At the fake website may be a login window asking for username and password.
  • If you type this in, the hackers have got your username and password.
  • There are many other types of phishing.
  • They all try to get you to give some information. They are fishing for information :)

 

Found an error or have an enhancement? Please let us know via this contact form