Lec-3 Network Security
Lec-3 Network Security
Ransomware Scareware
Spyware Phishing
Adware Rootkits
Other Malware Cont.
• Ransomware
• Ransomware compromises computers by encrypting the data.
• Charges a ransom to get the keys to decrypt the data.
• Scareware
• Scareware is malicious software that tricks ( حیلهcomputer users into visiting
malware-infested websites.
• Spyware
• Spyware is software that is installed on your computer either directly or
inadvertently. It runs in the background of your computer and secretly
monitors different programs
Other Malware Cont.
• Phishing
• The fraudulent attempt to obtain sensitive information such as username,
passwords and credit card numbers by disguising oneself as a trustworthy
entity in an electronic communication.
• Adware
• Adware is designed to display advertisements on your computer, redirect
your search requests to advertising websites.
• Rootkits
• Rootkits is a set of software tools that enable an unauthorized user to gain
control of a computer system without being detected.
Phishing Example
AAA Concepts
• AAA – Authentication
• Provide identification of who you are
• Username, Password, Certificate
• User or machine gets authenticated with identification
AAA Concepts Cont.
• AAA – Authorization
• Defines what you are allowed to do
• Device access – Privilege levels, allow commands
• Example: ACL
AAA Concepts Cont.
• AAA – Accounting
• Provide evidence of what you have done
• Command used
• Session identification (MAC, IP, Username)
AAA
Summary
Thank You
For Your Patience