Network management and security
-
Upload
ankit-bhandari -
Category
Internet
-
view
163 -
download
3
Transcript of Network management and security
Network management and
security
By Ankit BhandariVII sem, IT
INTRODUCTION
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.
Threats In Computer Networking
VIRUSES (Vital Information Resources Under Seize) Trojans WORMS (Write-Once, Read-Many) Logic Bombs Phishing
VIRUSES A computer virus is a malware program that, when
executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected"
Sample Virus
Trojans A Trojan horse, or Trojan, in computing is a generally
non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering Trojans that activate on certain dates are often called "time bombs”
WORMS
Write once read many (WORM) describes a data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device.
The CD-R and DVD-R optical disks for computers are common WORM devices.
Logic Bombs
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software
Phishing
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
Prevention from Threats
1: Install quality antivirusMany computer users believe free
antivirus applications, such as those included with an Internet service provider's bundled service offering, are sufficient to protect a computer from virus or spyware infection. However, such free anti-malware programs typically don't provide adequate protection from the ever-growing list of threats. Eg AVG, Awast, Norton etc
2: Perform daily scansOccasionally, virus and spyware threats escape a system's active
protective engines and infect a system. The sheer number and volume of potential and new threats make it inevitable that particularly inventive infections will outsmart security software. In other cases, users may inadvertently instruct anti-malware software to allow a virus or spyware program to run.
3: Disable autorunMany viruses work by attaching themselves to a drive and automatically
installing themselves on any other media connected to the system. As a result, connecting any network drives, external hard disks, or even thumb drives to a system can result in the automatic propagation of such threats.
4: Don't click on email links or attachments
It's a mantra most every Windows user has heard repeatedly: Don't click on email links or attachments. Yet users frequently fail to heed the warning.
Whether distracted, trustful of friends or colleagues they know, or simply fooled by a crafty email message, many users forget to be wary of links and attachments included within email messages, regardless of the source. Simply clicking on an email link or attachment can, within minutes, corrupt Windows, infect other machines, and destroy critical data.
5: Check for ProtocolsSites having HTTP/HTTPS protocols are more secured from virus or
phishing related attacks