You are on page 1of 18

Network management

and security

By
INTRODUCTION

In the world of computers, networking is the practice of linking two or


more computing devices together for the purpose of sharing data. Networks
are built with a mix of computer hardware and computer software.
Threats In Computer Networking

VIRUSES (Vital Information Resources Under Seize)


Trojans
WORMS (Write-Once, Read-Many)
Logic Bombs
Phishing
VIRUSES
A computer virus is a malware program that, when executed,
replicates by inserting copies of itself (possibly modified) into
other computer programs, data files, or the boot sector of the
hard drive; when this replication succeeds, the affected areas are
then said to be "infected"
Sample Virus
Trojans
A Trojan horse, or Trojan, in computing is a generally non-
self-replicating type of malware program containing malicious
code that, when executed, carries out actions determined by
the nature of the Trojan, typically causing loss or theft of
data, and possible system harm. The term is derived from the
story of the wooden horse used to trick defenders of Troy into
taking concealed warriors into their city in ancient Anatolia,
because computer Trojans often employ a form of social
engineering Trojans that activate on certain dates are often
called "time bombs”
WORMS

Write once read many (WORM) describes a data storage device in which
information, once written, cannot be modified. This write protection affords
the assurance that the data cannot be tampered with once it is written to the
device.
The CD-R and DVD-R optical disks for computers are common WORM devices.
Logic Bombs

A logic bomb is a piece of code


intentionally inserted into a
software system that will set off
a malicious function when
specified conditions are met
To be considered a logic bomb,
the payload should be unwanted
and unknown to the user of the
software
Phishing

Phishing is the attempt to


acquire sensitive information
such as usernames, passwords,
and credit card details (and
sometimes, indirectly, money)
by masquerading as a
trustworthy entity in an
electronic communication
Prevention from Threats

1: Install quality antivirus


Many computer users believe free
antivirus applications, such as
those included with an Internet
service provider's bundled service
offering, are sufficient to protect a
computer from virus or spyware
infection. However, such free anti-
malware programs typically don't
provide adequate protection from
the ever-growing list of threats. Eg
AVG, Awast, Norton etc
2: Perform daily scans
Occasionally, virus and spyware threats escape a system's active protective
engines and infect a system. The sheer number and volume of potential and
new threats make it inevitable that particularly inventive infections will
outsmart security software. In other cases, users may inadvertently instruct
anti-malware software to allow a virus or spyware program to run.
3: Disable autorun
Many viruses work by attaching themselves to a drive and automatically installing
themselves on any other media connected to the system. As a result,
connecting any network drives, external hard disks, or even thumb drives to a
system can result in the automatic propagation of such threats.
4: Don't click on email links or
attachments
It's a mantra most every Windows user
has heard repeatedly: Don't click on
email links or attachments. Yet
users frequently fail to heed the
warning.
Whether distracted, trustful of friends
or colleagues they know, or simply
fooled by a crafty email message,
many users forget to be wary of links
and attachments included within
email messages, regardless of the
source. Simply clicking on an email
link or attachment can, within
minutes, corrupt Windows, infect
other machines, and destroy critical
data.
5: Check for Protocols
Sites having HTTP/HTTPS protocols are more secured from virus or phishing
related attacks

You might also like