Tests performed under a controlled environment by a qualified person in order to check for current vulnerabilities in order to fix them.
Someone who has permission and is authorised to act as a penetration tester.
Someone who might not have permission, but will perform penetration testing and inform the organisation of any vulnerabilities they have found – often for a fee. Grey hat hackers will sometimes break the law during their testing, but are not malicious.
Someone without permission and who has malicious intent. These are the people that penetration testers are trying to stop.
Anti-malware is a type of software that is designed to protect computer systems from malicious software.
Preventing malware being installed
Detecting any malware that has been installed
Removing malware
A firewall is a tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it.
The decision to allow or block is based on rules, known as the firewall policy
For example, many firewalls ban access to unsecure websites
Altering the things certain people can access on the network
The aim is to only allow network users to access the things they need, to reduce the amount of actions they can take, thus reducing risk.
E.g: Students can’t save files to the shared drive but Staff can
However, staff can’t download new network security, only the network managers can
Having strong passwords increases the security of your account on a network or computer.
Way to make passwords more secure
Using longer words/symbols etc
Use biometric passwords (fingerprints/faceID)
Where data is translated into code so that only authorised users, or users with the key can decrypt it.
Prevents data being intercepted and read
Encryption is commonly used to protect sensitive information such as passwords, credit card numbers, and personal data from unauthorized access or theft.
Physical security is used to prevent physical access to devices, and to prevent theft.
Physical security may include:
door locks
window locks or bars
intruder alarm systems
CCTV systems
laptop locks (e.g. Kensington locks)
security guards.
Art style for this page - watercolour drawing