You are on page 1of 17

 Network security consists of the policies and practices adopted

to prevent and monitor unauthorized access, misuse,


modification, or denial of a computer network and network-
accessible resources. Network security involves the authorization
of access to data in a network, which is controlled by the
network administrator. Users choose or are assigned an ID and
password or other authenticating information that allows them
access to information and programs within their authority.
Network security covers a variety of computer networks, both
public and private, that are used in everyday jobs; conducting
transactions and communications among businesses,
government agencies and individuals. Networks can be private,
such as within a company, and others which might be open to
public access. Network security is involved in organizations,
enterprises, and other types of institutions. It does as its title
explains: It secures the network, as well as protecting and
overseeing operations being done. The most common and
simple way of protecting a network resource is by assigning it a
unique name and a corresponding password.
 As a fute computer technician you need to
understand computer and network security
failure to implement proper security
procedures can affect users computers and
the general public. Private
information,company secrets,financial
data,computer equipment, and items about
national security are placed at risk if proper
security procedure are not followed
 Anyone who uses a computer these days has almost certainly come across the
term “firewall” and knows it has something to do with providing security. But to
fully protect corporate resources requires a more in-depth understand of how
firewalls work and where to place them.
 The name firewall comes from a common architectural practice of placing a brick
wall between two structures, to prevent a fire in one from spreading to the other.
That’s a useful way to think of what a security firewall does: it provides a barrier
to control network traffic both into and out of an organization’s Internet-
connected network, or perhaps between different segments of an internal
network.
 Firewalls can take many forms, from dedicated appliances, to software that runs
on general-purpose servers, or as part of a multi-function security appliance.
Generally the firewall has two network interfaces: one for the external side of the
network, one for the internal side. Its purpose is to control what traffic is allowed
to traverse from one side to the other.
 As the most basic level, firewalls can block traffic intended for particular IP
addresses or server ports. Typically, companies set up their firewalls to allow
incoming connections to port 80, which is the standard port for use by Web
servers. This allows visitors to get at a coporate web site, for example, but
“untrusted” traffic intended for some other port would be denied access.
Untrusted means the origin of the traffic is uknown. Company employees who
have proper credentials, such as a username and password, would be allowed
access via a secure connection, typically a virtual private network.
VIRUS
WORM
TROJAN HORSE
 A computer virus, much like a flu virus, is designed to
spread from host to host and has the ability to replicate
itself. Similarly, in the same way that viruses cannot
reproduce without a host cell, computer viruses cannot
reproduce and spread without programming such as a file
or document. In more technical terms, a computer virus is
a type of malicious code or program written to alter the
way a computer operates and that is designed to spread
from one computer to another. A virus operates by
inserting or attaching itself to a legitimate program or
document that supports macros in order to execute its
code. In the process a virus has the potential to cause
unexpected or damaging effects, such as harming the
system software by corrupting or destroying data.
 Computers and computer users are under
assault by hackers like never before, but
computer viruses are almost as old as
electronic computers themselves. Most
people use the term “computer virus” to refer
to all malicious software, which we call
malware. Computer Viruses are actually just
one type of malware, a self-replicating
programs designed to spread itself from
computer to computer. A virus is, in fact, the
earliest known malware invented.
 A computer worm is a standalone malware computer
program that replicates itself in order to spread to
other computers.[1] Often, it uses a computer
network to spread itself, relying on security failures
on the target computer to access it. Worms almost
always cause at least some harm to the network, even
if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted
computer.
 Many worms that have been created are designed
only to spread, and do not attempt to change the
systems they pass through. However, as the Morris
worm and Mydoom showed, even these "payload-
free" worms can cause major disruption by increasing
network traffic and other unintended effects.
 The actual term "worm" was first used in John Brunner's 1975 novel, The
Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a
data-gathering worm in an act of revenge against the powerful men who
run a national electronic information web that induces mass conformity.
"You have the biggest-ever worm loose in the net, and it automatically
sabotages any attempt to monitor it... There's never been a worm with
that tough a head or that long a tail!"[2]
 On November 2, 1988, Robert Tappan Morris, a Cornell
University computer science graduate student, unleashed what became
known as the Morris worm, disrupting a large number of computers then
on the Internet, guessed at the time to be one tenth of all those
connected.[3] During the Morris appeal process, the U.S. Court of Appeals
estimated the cost of removing the virus from each installation at
between $200 and $53,000; this work prompted the formation of
the CERT Coordination Center[4] and Phage mailing list.[5] Morris himself
became the first person tried and convicted under the 1986 Computer
Fraud and Abuse Act.
 In computing, a Trojan horse, or Trojan, is
any malicious computer program which misleads users of its true
intent. The term is derived from the Ancient Greekstory of the
deceptive wooden horse that led to the fall of the city
of Troy.[1][2][3][4][5]
 Trojans are generally spread by some form of social engineering,
for example where a user is duped into executing an e-mail
attachment disguised to be unsuspicious, (e.g., a routine form to
be filled in), or by drive-by download. Although their payload
can be anything, many modern forms act as a backdoor,
contacting a controller which can then have unauthorized access
to the affected computer.[6] Trojans may allow an attacker to
access users' personal information such as banking information,
passwords, or personal identity (IP address). It can infect other
devices connected to the network. Ransomware attacks are often
carried out using a Trojan.
Antivirus or anti-virus software (often abbreviated
as AV), sometimes known as anti-malware software,
is computer software used to prevent, detect and
remove malicious software.[1]
Antivirus software was originally developed to detect
and remove computer viruses, hence the name.
However, with the proliferation of other kinds
of malware, antivirus software started to provide
protection from other computer threats. In particular,
modern antivirus software can protect from:
malicious browser helper objects (BHOs), browser
hijackers, ransomware, keyloggers, backdoors, rootkits,
trojan horses, worms,
malicious LSPs, dialers, fraudtools, adware and spyware.[
2] Some products also include protection from

other computer threats, such as infected and


malicious URLs, spam, scam and phishing attacks, onlin
e identity (privacy), online banking attacks, social
engineering techniques, advanced persistent
threat (APT) and botnet DDoS attacks.
 1: network security involves the authorization of
access to data in a network?
 2. the network security consists of the policies
and practices adopted to prevent and monitor
unauthorized
 3.the network security is commonly known as
malware?
 4.network security is the security provided to a
network from unauthorized access and risk?
 5.a network security is a standalone of a
malware computer program?
 1.)What be accomplished of Network Security? 2.)What be
accomplished of viruses in your computer software?
 3.)A___________attached to other software this replicated
like virus
 4.)A___________self-replicating program this uses
duplicate codes
 5.)What virus same also at worm professed useful
computer software?
6.)This Virus is harmful to the network and consumes
bandwidth?
7.)This is a virus to_________or delete files
8.)What removes virus in your conputer?
9.)Network security why is important in big companies?
10.)Computer___________are malicous intent
 1. anyone who uses a computer these days has
almost certainly come across term
 A.antivirus b.malicious software c.firewall
 2.the ____ comes from a common architectural
practice a placing a brick
 A.firewall b.network security c.trojan horse
 3.what is the main part to need ?
 A.70 b.100 c.80
 4._____ can block traffic intended for particular IP
ADRESESS OR SERVER PORTS
 A.computer B.security C.firewall
 5.what Is the tittle of my of topic
 A.network security
 B.firewall
 C.function of network security

You might also like