Monday, 23 May 2016

Network & Computer Security

Introduction to Network
Consists of the provisions & policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.

Unauthorized Access/Used

Unauthorized access : When an individual gain access to a computer, network or file without permission.
Unauthorized used : Using a computer resource for unauthorized activity.

Types of unauthorized access/used.
1. Hacking - act of breaking into a computer or network. Using a computer to hack another computer system.
2. War Driving & Wi-Fi piggybacking - unauthorized used of a Wi-Fi network.
3. Interception of communication - gaining unauthorized access to the files/data/messages/e-mail.

Computer Sabotage
Acts of malicious destruction to a computer or computer resource.

Forms of computer sabotage :
  • Botnet - computer that is controlled by a hacker.
  • Denial of service - attempt to flood a network with so many requests for action. Leads to shuts down or simply cannot handle legitimate requests anymore.
  • Computer viruses 
Phishing & Web Spoofing

Phishing 
  • attacks are performed with the intention to acquire personal information like credit card numbers, bank account.
  • the recipients are encouraged to enter personal identification data.
Web Spoofing
  • mocking the web presences of trusted corporations with the intention to trick customers.
  • also employed for phishing attacks.
Desktop Security Issues 
End users' security can be endangered through threats like adware, spyware, viruses and worms.
  1. Adware - programs used to deliver advertising content
  2. Spyware - intends to remain unrecognized
  3. Viruses - programs that are attached to executable files or documents. Virus is executed when the host program is executed or documents is loaded.
  4. Worms - programs that can replicate or copy themselves. Example : when it is being distributed as e-mail attachment, a worm might send a copy to all the address listed.
  5. Trojan horses - program do not replicate themselves but typically cause damage or compromise of security of infected computers. Damage caused varies include data theft and destruction or illegitimate access.

No comments:

Post a Comment