Network security, its
challenges and solutions

Threats to Network Security

Vulnerability

various devices (servers, PCs,
routers)

Threats

Unstructured threats

Structured threats

External threats

Internal threats

Groups of people (who pose
threats)

Hacker

a person who tries to access
network resources with malicious
intent.

Cracker^

attempts to gain unauthorized
access to network resources

Phreaker

manipulates the telephone
network

the goal is to penetrate the
telephone network to make free
long-distance calls.

Spammer

use viruses to take control of home
computers

Phisher

uses email to steal confidential
information

White hat

use their abilities to find
vulnerabilities in systems or
networks

report these vulnerabilities to
system owners so that they can be
fixed

Black hat

use their knowledge of computer
systems to hack into systems or
networks

Attacks

System access

Denial of service (DoS)

Malicious software

Trojan horses

The Most Devastating Cyber
Attacks of 2022

Crypto Theft

Add your text

Microsoft Data Breach

Add your text

News Corp Server Breach

Add your text

Red Cross Data Breach

Add your text

Ronin Crypto Theft

theft due to a change in security
protocol

Cash App Data Breach

A lot of sensitive financial
information was stolen in the hack.