Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
What is Spam? d min.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Network System Security - Task 2. Russell Johnston.
How To Remove Flooders?-Get Help Website:
Security Risks Todays Lesson Security Risks Security Precautions
Instructor Materials Chapter 7 Network Security
Network security threats
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Network Security

 With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.  Network security is a major part of a network that needs to be maintained because information is being passed between computers etc and is very vulnerable to attack.  Over the past five years people that manage network security have seen a massive increase of hackers and criminals creating malicious threats that have been pumped into networks across the world.

 According to ITSecurity.com the following are ten of the biggest network threats:  “1.Viruses and Worms”,  “2.Trojan Horses”,  ”3.SPAM”,  “4.Phishing”,  “5.Packet Sniffers”,  ”6. Maliciously Coded Websites”,  ”7. Password Attacks”,  “8.Hardware Loss and Residual Data Fragments”,  “9. Shared Computers”,  “10.Zombie Computers and Botnets”

 A Virus is a “program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes”.  Viruses can cause a huge amount of damage to computers.  An example of a virus would be if you opened an and a malicious piece of code was downloaded onto your computer causing your computer to freeze.

 In relation to a network, if a virus is downloaded then all the computers in the network would be affected because the virus would make copies of itself and spread itself across networks  A worm is similar to a virus but a worm can run itself whereas a virus needs a host program to run.  Solution: Install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms and have Firewalls- serves as a shield.

 A Trojan Horse is “a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.  In a network if a Trojan Horse is installed on a computer and tampers with the file allocation table it could cause a massive amount of damage to all computers of that network.  Solution: Security suites, such as Norton Internet Security, will prevent you from downloading Trojan Horses and have Firewalls- serves as a shield.

 SPAM is “flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.  I believe that SPAM wouldn’t be the biggest risk to a network because even though it may get annoying and plentiful it still doesn’t destroy any physical elements of the network.  Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of the providers online. Also you can buy a variety of SPAM filters that work effectively.

 Phishing is “an fraud method in which the perpetrator sends out legitimate-looking s in an attempt to gather personal and financial information from recipients.  In my opinion phishing is one of the worst security threats over a network because a lot of people that use computers linked up to a network are amateurs and would be very vulnerable to giving out information that could cause situations such as theft of money or identity theft.  Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent threat.

 “A packet sniffer is a device or program that allows eavesdropping on traffic travelling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis.  In a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft so this is a major security threat to a network.  Solution: “When strong encryption is used, all packets are unreadable to any but the destination address, making packet sniffers useless. So one solution is to obtain strong encryption.

 Some websites across the net contain code that is malicious.  Malicious code is “Programming code that is capable of causing harm to availability, integrity of code or data, or confidentiality in a computer system…  AVG report that “300,000 infected sites appear per day”  Solution: Using a security suite, such as AVG, can detect infected sites and try to prevent the user from entering the site.

 Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas.  Many systems on a network are password protected and hence it would be easy for a hacker to hack into the systems and steal data.  This may be the easiest way to obtain private information because you are able to get software online that obtains the password for you.  Solution: At present there is no software that prevents password attacks.

 Hardware loss and residual data fragments are a growing worry for companies, governments etc.  An example this is if a number of laptops get stolen from a bank that have client details on them, this would enable the thief’s to get personal information from clients and maybe steal the clients identities.  This is a growing concern and as of present the only solution is to keep data and hardware under strict surveillance.

 Shared computers are always a threat.  Shared computers involve sharing a computer with one or more people.  The following are a series of tips to follow when sharing computers: “Do not check the “Remember my ID on this computer” box … Never leave a computer unattended while signed-in … Always sign out completely … Clear the browsers cache … Keep an eye out for “shoulder surfers” … Avoid confidential transactions … Be wary of spyware … Never save passwords … Change your password often”

 “A zombie computer, or “drone” is a computer that has been secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely and many zombie computers can be used together to attack other computers or servers.”  A hacker could hack into a computer and control the computer and obtain data.  Solution: Antivirus software can help  prevent zombie computers.

 A botnet “is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the internet”.  This is a major security threat on a network because the network, unknown to anyone, could be acting as a hub that forwards malicious files etc to other computers.  Solution: Network Intrusion Prevention (NIP) systems can help prevent botnets.

 Network Security is a very broad field and being a Network Security manager is not an easy job.  There are still threats such as password attacks that have no prevention.  Many of the threats set out to get personal information.

Samoal Awad Yau Muhammad Zangina Waddah Mohamed Sulaiman Salihu Sahl Awad Samer Tarig Samoal Awad Yau Muhammad Zangina Waddah Mohamed Sulaiman Salihu Sahl Awad Samer Tarig