Network management and security

18
Network management and security By Ankit Bhandari VII sem, IT

Transcript of Network management and security

Page 1: Network management and security

Network management and

security

By Ankit BhandariVII sem, IT

Page 2: Network management and security

INTRODUCTION

In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.

Page 3: Network management and security

Threats In Computer Networking

VIRUSES (Vital Information Resources Under Seize) Trojans WORMS (Write-Once, Read-Many) Logic Bombs Phishing

Page 4: Network management and security

VIRUSES A computer virus is a malware program that, when

executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected"

Page 5: Network management and security

Sample Virus

Page 6: Network management and security

Trojans A Trojan horse, or Trojan, in computing is a generally

non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering Trojans that activate on certain dates are often called "time bombs”

Page 7: Network management and security

WORMS

Write once read many (WORM) describes a data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device.

The CD-R and DVD-R optical disks for computers are common WORM devices.

Page 8: Network management and security

Logic Bombs

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met

To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software

Page 9: Network management and security

Phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication

Page 10: Network management and security
Page 11: Network management and security
Page 12: Network management and security

Prevention from Threats

1: Install quality antivirusMany computer users believe free

antivirus applications, such as those included with an Internet service provider's bundled service offering, are sufficient to protect a computer from virus or spyware infection. However, such free anti-malware programs typically don't provide adequate protection from the ever-growing list of threats. Eg AVG, Awast, Norton etc

Page 13: Network management and security

2: Perform daily scansOccasionally, virus and spyware threats escape a system's active

protective engines and infect a system. The sheer number and volume of potential and new threats make it inevitable that particularly inventive infections will outsmart security software. In other cases, users may inadvertently instruct anti-malware software to allow a virus or spyware program to run.

Page 14: Network management and security

3: Disable autorunMany viruses work by attaching themselves to a drive and automatically

installing themselves on any other media connected to the system. As a result, connecting any network drives, external hard disks, or even thumb drives to a system can result in the automatic propagation of such threats.

Page 15: Network management and security

4: Don't click on email links or attachments

It's a mantra most every Windows user has heard repeatedly: Don't click on email links or attachments. Yet users frequently fail to heed the warning.

Whether distracted, trustful of friends or colleagues they know, or simply fooled by a crafty email message, many users forget to be wary of links and attachments included within email messages, regardless of the source. Simply clicking on an email link or attachment can, within minutes, corrupt Windows, infect other machines, and destroy critical data.

Page 16: Network management and security

5: Check for ProtocolsSites having HTTP/HTTPS protocols are more secured from virus or

phishing related attacks

Page 17: Network management and security
Page 18: Network management and security