0% found this document useful (0 votes)
50 views12 pages

Network Security: Computer Systems Servicing 10

The document discusses computer and network security, noting that a technician's primary responsibilities include maintaining data and network security through activities like configuring secure network settings, applying software updates, and instructing users on good security practices. It describes various security threats like physical attacks, data attacks, internal threats from employees, and external threats from unauthorized users outside the organization. The document also outlines different types of malware like viruses, worms, and Trojan horses that can pose security risks.

Uploaded by

Edelmar Benosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views12 pages

Network Security: Computer Systems Servicing 10

The document discusses computer and network security, noting that a technician's primary responsibilities include maintaining data and network security through activities like configuring secure network settings, applying software updates, and instructing users on good security practices. It describes various security threats like physical attacks, data attacks, internal threats from employees, and external threats from unauthorized users outside the organization. The document also outlines different types of malware like viruses, worms, and Trojan horses that can pose security risks.

Uploaded by

Edelmar Benosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

COMPUTER SYSTEMS SERVICING 10

Network Security

Edelmar G. Benosa
BACKGROUND INFORMATION FOR
LEARNERS
Computer and network security help keep data and
equipment safe by giving only the appropriate people
access. Everyone in an organization should give high
priority to security, because everyone can be affected
by a lapse in security. Theft, loss, network intrusion,
and physical damage are some of the ways a network
or computer can be harmed.
BACKGROUND INFORMATION FOR
LEARNERS
A technician’s primary responsibilities include data and network security.
You may have to repair, adjust, and install equipment. You need to know
how to configure settings to keep the network secure, but still keep it
available to those who need to access it. You will ensure that software
patches and updates are applied, antivirus software is installed, and
antispyware software is used. You may also be asked to instruct users on how
to maintain good security practices with computer equipment.
01
Security Attacks
 Physical: Events or attacks that steal, damage,
or destroy such equipment as servers,
switches, and wiring.
 Data: Events or attacks that remove, corrupt,
deny access to, allow access to, or steal
information.
Threats to security can come from
inside or outside an organization, and
the level of potential damage can vary
greatly. Potential threats include the
following:
 Internal: Employees who have access to data,
equipment, and the network. Internal attacks can be
characterized as follows:
• Malicious threats are when an employee intends
to cause damage.
• Accidental threats are when the user damages
data or equipment unintentionally.
 External: Users outside an organization who do not
have authorized access to the network or resources.
External attacks can be characterized as follows:
• Unstructured attacks, which use available
resources, such as passwords or scripts, to gain
access to and run programs designed to vandalize.
• Structured attacks, which use code to access
operating systems and software.
02
Types of Malware
• Virus is attached to small pieces of computer code, software,
or document. The virus executes when the software runs on a
computer.
• Worm is a self-replicating program that is harmful to
networks. A worm uses the network to duplicate its code to
the hosts on a network, often without any user intervention.
• Trojan horse technically is a worm. It does not need to be
attached to other software. Instead, a Trojan threat is hidden
in software that appears to do one thing, and yet behind the
scenes it does another.
03
Assessment

You might also like