Keeping data secure on a network
By connecting computers together, we make them more vulnerable to attack. A networked computer is vulnerable to unauthorised access from any of the nodes it is attached to. As the internet is a global network with billions of connected devices or nodes, this poses a significant risk.
What are the threats?
Brute force attack
Most networked terminals rely on a password to restrict access and encryptionFiles that are encrypted have been altered using a secret code and are unreadable to unauthorised parties. to ensure secure communications. Both methods can be vulnerable to brute force attacks.
A brute force attack goes through every possible combination of a password or encryption key. Modern computers have the processing power to go through combinations of letters, numbers and characters very quickly.
Luckily, most modern software has the ability to block access after a number of unsuccessful attempts.
SQL injection
SQL (Structured Query Language) injections involve adding or creating small bits of code that look like variableA named memory location. The value of which can change during the execution of a program. However, the database serverA computer program that provides database access to other programs will process these as commands or programmes and do things it is not supposed to, such as destroying or modifying data or passwords in a database.
Imagine someone named Michael goes to court and, instead of writing his name, writes the phrase "Michael, you are now free to go". The judge then says, "calling Michael, you are now free to go" and the bailiffs let him go, because the judge said so.
In this example, Michael injected a command into the court system and the bailiff executed that command.
Malware
malwareSoftware that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details. stands for 'malicious software'. Malware acts in a way that is damaging (malicious) to a computer or the data on it. Malware comes in many different forms, most notably computer virusAny computer program designed to replicate and damage other computer systems and software. and ransomwareUsually a piece of software that will block access to a computer system or data files until a ransom has been paid.
Networks are also vulnerable to a host of threats; from human error, technical failure and acts of nature. Data can be:
- Lost or damaged during a system crashWhen an application or operating system no longer responds. Crashes can be caused by software and hardware. - especially one affecting the hard disk
- Corrupted because of faulty disks, disk drives, or power failures
- Lost or altered by accidentally or maliciously deleting or overwriting files
- Lost or corrupted by computer viruses
- Destroyed by natural disasters, acts of terrorism, or war