Identifying vulnerabilities
It is important that networkA group of interconnected computers/devices. managers ensure their networks are safe from hackerA person who tries to gain unauthorised access to a computer.. They will often test to see how successful a possible attack could be.
Footprinting
Footprinting is a technique used for actively gathering information about the different methods of gaining access to the system. To get this information, a hacker might use various tools and technologies:
- looking at employees鈥 social media to help them understand their habits and passwords
- looking to see how customers are given access to some areas of the network
- using the WHOIS databaseA data store designed in an organised way, making it easier to search for the information you need., which contains the contact names and email addresses of the network administrators for nearly all the websites on the internet
Penetration testing
The purpose of penetration testingSystems are tested for vulnerabilities to reveal any weaknesses in the system which can be fixed. is to determine how resilient a network is against an attack. It involves authorised users - sometimes an external party or organisation - probing the network for potential weaknesses and attempting to exploit them. This is known as 鈥榚thical hacking鈥, as it is done with full permission from the organisation.
Commercial analysis tools
Network managers can purchase softwareThe programs, applications and data in a computer system. Any parts of a computer system that aren't physical. to test the robustness of their own networks and test the resilience themselves. They might do this if they do not want to employ another organisation to perform penetration testing.
Network policies
A network manager should have a network policy that ensures:
- users have a secure, hard-to-guess password that meets specified conditions
- users change their password on a regular basis
- users cannot connect unauthorised equipment, such as USB memory stickA physically small storage device. It normally plugs into a USB port. They are also called USB sticks, memory sticks, thumb or flash drives. These devices use solid state memory with no moving parts., smartphones and tablets, to the network
- levels of access allow only authorised users to access sensitive data
- a regular backupA copy of important files that is kept separately in case the original files are lost or damaged. procedure is in place
- a disaster recovery procedure exists in case of data loss
- regular penetration testing and forensic analysis is carried out
- regular maintenance is carried out, including applying software upgrades and security patchAn update to a piece of software, usually to fix bugs or improve the software in some way. to equipment
- physical access to serverA computer that holds data to be shared with other computers. Servers require server software. is prevented
- high level of security is maintained, with up-to-date anti-virusAnti-virus software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them. software and firewallAn application that prevents unauthorised connections to and from the Internet.
More guides on this topic
- The CPU - Eduqas
- Primary storage - Eduqas
- Secondary storage and embedded systems - Eduqas
- Networks - Eduqas
- Data representation - Eduqas
- Storage and data organisation - Eduqas
- Operating systems - Eduqas
- Principles of programming - Eduqas
- Algorithms - Eduqas
- Sorting, searching and validation - Eduqas
- Software development - Eduqas
- Impacts of digital technology on wider society - Eduqas