1. Network security involves authorizing access to data in a network and consists of policies and practices to prevent and monitor unauthorized access.
2. Users are assigned IDs and passwords to access information and programs within their authority.
3. Network security covers both public and private computer networks used for jobs, transactions, communications between businesses, government and individuals.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
159 views
Network Security
1. Network security involves authorizing access to data in a network and consists of policies and practices to prevent and monitor unauthorized access.
2. Users are assigned IDs and passwords to access information and programs within their authority.
3. Network security covers both public and private computer networks used for jobs, transactions, communications between businesses, government and individuals.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17
Network security consists of the policies and practices adopted
to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network- accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. As a fute computer technician you need to understand computer and network security failure to implement proper security procedures can affect users computers and the general public. Private information,company secrets,financial data,computer equipment, and items about national security are placed at risk if proper security procedure are not followed Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate resources requires a more in-depth understand of how firewalls work and where to place them. The name firewall comes from a common architectural practice of placing a brick wall between two structures, to prevent a fire in one from spreading to the other. That’s a useful way to think of what a security firewall does: it provides a barrier to control network traffic both into and out of an organization’s Internet- connected network, or perhaps between different segments of an internal network. Firewalls can take many forms, from dedicated appliances, to software that runs on general-purpose servers, or as part of a multi-function security appliance. Generally the firewall has two network interfaces: one for the external side of the network, one for the internal side. Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most basic level, firewalls can block traffic intended for particular IP addresses or server ports. Typically, companies set up their firewalls to allow incoming connections to port 80, which is the standard port for use by Web servers. This allows visitors to get at a coporate web site, for example, but “untrusted” traffic intended for some other port would be denied access. Untrusted means the origin of the traffic is uknown. Company employees who have proper credentials, such as a username and password, would be allowed access via a secure connection, typically a virtual private network. VIRUS WORM TROJAN HORSE A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves. Most people use the term “computer virus” to refer to all malicious software, which we call malware. Computer Viruses are actually just one type of malware, a self-replicating programs designed to spread itself from computer to computer. A virus is, in fact, the earliest known malware invented. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Many worms that have been created are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload- free" worms can cause major disruption by increasing network traffic and other unintended effects. The actual term "worm" was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail!"[2] On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting a large number of computers then on the Internet, guessed at the time to be one tenth of all those connected.[3] During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the virus from each installation at between $200 and $53,000; this work prompted the formation of the CERT Coordination Center[4] and Phage mailing list.[5] Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act. In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greekstory of the deceptive wooden horse that led to the fall of the city of Troy.[1][2][3][4][5] Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan. Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.[1] Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.[ 2] Some products also include protection from
other computer threats, such as infected and
malicious URLs, spam, scam and phishing attacks, onlin e identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks. 1: network security involves the authorization of access to data in a network? 2. the network security consists of the policies and practices adopted to prevent and monitor unauthorized 3.the network security is commonly known as malware? 4.network security is the security provided to a network from unauthorized access and risk? 5.a network security is a standalone of a malware computer program? 1.)What be accomplished of Network Security? 2.)What be accomplished of viruses in your computer software? 3.)A___________attached to other software this replicated like virus 4.)A___________self-replicating program this uses duplicate codes 5.)What virus same also at worm professed useful computer software? 6.)This Virus is harmful to the network and consumes bandwidth? 7.)This is a virus to_________or delete files 8.)What removes virus in your conputer? 9.)Network security why is important in big companies? 10.)Computer___________are malicous intent 1. anyone who uses a computer these days has almost certainly come across term A.antivirus b.malicious software c.firewall 2.the ____ comes from a common architectural practice a placing a brick A.firewall b.network security c.trojan horse 3.what is the main part to need ? A.70 b.100 c.80 4._____ can block traffic intended for particular IP ADRESESS OR SERVER PORTS A.computer B.security C.firewall 5.what Is the tittle of my of topic A.network security B.firewall C.function of network security