Professional Documents
Culture Documents
Network Quality and Cyber Security
Network Quality and Cyber Security
• Work together
• This helps to identify the best - most efficient and most reliable –
route for the packet(s) to take
Vs.
Security: Business
Vulnerabilities
Open Firewall Ports
• Aimlessly following Internet guides to troubleshoot software, etc.
• If malware finds its way onto the system, it may scan for opened ports to
allow for Internet access without prompting the user further
File Permissions
• Enforcing on a file or folder basis the specific access that is permitted
• Linux is much better at this, with access modifiers for reading, writing
and executing on a user basis
• “Root access”
• https://github.com/criggs626/PhishingTemplates/tree/master/emails
Activity
• How can we secure against these identified threats?
• Insecure users
• Bad file permissions
• Trojans
• Phishing