Lecture 7-8
Lecture 7-8
Lecture: 7-8
Worms
Many anti-malware products are available to prevent the spread of all types of
malware as well remove malware from infected computers. These include the
following:
BitDefender—www.bitdefender.com.
Kaspersky Anti-Virus—www.kaspersky.com.
Webroot Antivirus—www.webroot.com.
Norton AntiVirus—www.symantec.com/norton/antivirus.
ESET Nod32 Antivirus—www.eset.com.
AVG Antivirus—www.avg.com.
G DATA Antivirus—www.gdatasoftware.com.
Avira Antivirus—www.avira.com.
McAfee Endpoint Protection—www.mcafee.com.
Trend Micro—www.trendmicro.com.
Microsoft Security Essentials—www.microsoft.com/ security_essentials
Attack prevention tools and techniques:
Protecting Your System with Firewalls
A firewall is a program or dedicated hardware device that inspects network traffic
passing through it and denies or permits that traffic based on a set of rules you
determine at configuration.
A firewall’s basic task is to regulate the flow of traffic between computer networks
of different trust levels—for example, between the LAN-to-WAN domain and the
WAN domain, where the private network meets the public Internet.
There are numerous firewall solutions available. Prominent firewall vendors include
the following:
Palo Alto Networks—www.paloaltonetworks.com.
Cisco Systems—www.cisco.com.
SonicWALL—www.sonicwall.com.
WatchGuard Technologies—www.watchguard.com.
Check Point—www.checkpoint.com.
SUMMARY
Risks, threats, and vulnerabilities in the seven domains of an IT infrastructure and its
assets are an everyday menace.
It is essential that organizations and individual users identify their own risks, threats,
and vulnerabilities and implement a plan to mitigate them.
There are many types of threats. These include confidentiality threats, integrity
threats, and availability threats. In addition, there is the threat of a malicious attack.
Malicious attacks can originate from Active threats that include
Brute-force,
Masquerading,
IP address spoofing,
Session hijacking,
Replay, man-in-the-middle,
Passive threats can include eavesdropping and monitoring. Viruses are the most
common and frequent type of attack.
Anti-malware software is the most effective method of countering a virus attack. The
easiest target are users unaware of the security threats
References
David Kim, Michael G. Solomon Fundamentals of Information Systems Security, 4th Edition,
Jones & Bartlett Learning, ISBN: 9781284116465
(https://books.google.com.pk/books?id=DiVGEAAAQBAJ&printsec=copyright&redir_esc=y#v=on
epa ge&q&f=false)