Threat
A threat is a potential violation of
security. When a threat is executed it becomes attack and those who execute
such threats are called attackers.
Some common threats average computer user
faces everyday are:
Computer viruses- Computer viruses are malicious codes that cause damage to data and
files on a system. It can attack any part of a computer's software such as boot
block, operating system areas, files and application programs macros etc.
There are also two other similar programs
that work like virus are:
Worms- These are self-replicating program
which eats up entire disk space or memory
Trojan horses- These programs appear harmless but actually perform malicious functions such as deleting or damaging files.
Damaged caused by viruses are:
- Damage or delete files
- Slow down computer
- Invade (attack) email program
Spyware- Spyware is a software which spy on users activity and report this data to
people willing to pay for it.
Damage caused by spyware:
- Compromises your data, computing habits and Identity
- Altars PC settings
- Slowdown PC
Adware- These are the programs that deliver unwanted ads in popup form and consume
network bandwidth. Adware is similar to spyware however it may be installed
with the user consent.
Damage caused by adware:
- Track information just like spyware
- Displays array of annoying advertising
- Slowdown PC
Spamming- Spamming refers to sending bulk email by an identified or unidentified source.
Damage caused by spamming:
- Reduce productivity
- Eats up your time
- Leads to worse things
PC intrusion- When a PC is connected to the internet, it is a potential target for hackers. PC intrusion can occur in any of the following forms.
- Sweeper attack- It is a malicious program used by hackers to sweeps or deletes all the data from a system.
- Daniel of services- This attack eats up all the resources such as processor, RAM etc. and stop application to work properly. Flooding of junk mail is an example of such an attack.
- Password guessing- Most hackers crack or guess password of system accounts and use it for causing damages.
- Snooping- Snooping refers to opening and looking through files in an unauthorised manner. It involves monitoring of keystrokes pressed, capturing of passwords and login information etc.
- Eavesdropping- It is similar to snooping and it is used to listen to the conversation that they are not part of. It is called eavesdropping
- Phishing- Phishing is the criminal criminally fraudulent process of attempting to acquire sensitive information such as username, password, credit card information etc. In Phishing an imposter uses an authentic-looking email or website to trick recipients into giving out personal information and later it is used for cybercrimes and frauds.
Network security measures- When we go online we need a combination of identification,
authentication and authorisation to control access to the system. We can use
various techniques for network security:
- Authorisation- Asking a user a legal login ID performs at the authorisation
- Authentication- Authentication is also termed as password protection
- Firewall- A system designed to prevent unauthorised access to or from a public or private network is called firewall.
- Intrusion(Violation) detection- Intrusion detection system monitor system and network resources and when it is identified as a possible intrusion then it notifies the authorities.
Also we can implement preventive measure
such as:
- Implement proper security policy for your organisation
- Use proper file access permissions when sharing files on network
- Disconnect from the internet when away
Network Operating System Administration
- Hardware and Network Operating System Maintenance
- Network Security
- IT Career Opportunities
- Installation of Linux
- Installation of Windows NT
- Windows NT and Its Advantages and disadvantages
- Difference between Linux and Windows NT
- Linux Firewall and Its Types
- Basic Storage Devices Concepts
- Shell Scripting
- Administering User Accounts using GUI tool and Command Line