Network problems Last week, we talked about 3 disadvantages of networks. What are they?
-
Upload
noel-matthews -
Category
Documents
-
view
214 -
download
0
Transcript of Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Network problems
• Last week, we talked about 3 disadvantages of networks.
• What are they?
Why Not Use Networks?
• The computer is vulnerable to hackers
• If the network breaks, many tasks become very difficult
• Your computer can more easily be attacked by a virus
Network security
• Why would someone want to attack your computer?
Why?
• To access your data
• To use your computer to attack other computers
Accessing your data
• What details could be stolen from you?
• For what purpose could they be used?
Spyware
• Collects personal data
• Collects internet usage history
• Often used for unwanted advertising
Unwanted advertising!
Fraud
• Using your personal data to steal money!
• Credit card details targetted.
Botnet
Storm Botnet
• Estimated: between 200,000 and 1,000,000 computers infected
• Estimated 8% of all malware on Windows
• Used for spam email
• Used to attack international banks
Kraken Botnet
• About 400,000 computers infected
• 50 Fourtune 500 companies infected
• Sends about 9,000,000,000 spam email messages/day
Srizbi Botnet
• Roughly 400,000 infected computers
• Estimated 60,000,000,000 spam emails sent/day
• Nov 2008 – controlling network taken offline– Global spam email decreased 75%
How is a computer attacked?
• What do you know?
How is a computer attacked?
• Port scanning
• Phishing
• Trojan
Port Scanning
• This is an active attack
• A hacker runs a program to find vulnerable spots in the network
• The hacker can then run another program to access your computer
Port Scanning
Port scanning protection
• Firewall
• Updates
Firewall
• A program that checks incoming data
• If it is not from a trusted source, the data is blocked
Updates
• The hacker must find a vulnerable program
• When a vulnerability is found, the company will patch the software
• The patch fixes the vulnerability
• The hacker can’t attack in that way
Phishing
• An attack through email or IM
• A fake link that takes you to a dangerous website
• The website can then run a dangerous program, or collect your information
Phishing Email
Phishing – How to identify
Phishing – how to prevent it
• Read emails and IM’s carefully
• Be suspicious of links
• Run ONE anti-virus program
Trojan
• A program that says it will do something, but does something else.
Sources of trojans
• Email attachments
• A downloaded program (.exe files, like cracks or keygens)
• Dangerous programs on the internet
Trojans – how to prevent!
• Don’t run a program you don’t trust
• Scan suspicious files with an anti-virus tool
• Run Windows as a user, not as administrator
If you have a virus
• Run ONE anti-virus program
• Run anti-spyware and/or anti-adware scans
• Update all programs!
Homework exercise
• Remember, there will be a quiz next week very similar to this exercise.
• If you have questions, ask!
Homework exercise
• Imagine you are the class teacher for your class. You must create a database of your students.
• Create a table in design view containing the fields you think are important. Remember to choose a primary key.
• Add data to the database. You can invent the data, it does not have to be true. Fill in 3 records.