Network Threats and Security
Network Threats and Security
Network threats and security presses on the keyboard may be sent to the
hacker. This means that the hacker could
Previously, we learnt that how different discover the keystrokes of passwords, giving
scenarios call for different network types, them access to confidential login details.
including WAN, LAN, MAN. We also
differentiated between wired and wireless 4. Unauthorised access
networks. There are a number of ways in which hackers
Irrespective of the type of network used, may try to gain access to computers and systems
networks can are constantly exposed to several that they should not have access to.
threats. This includes the following threats: • Social engineering
1. Viruses • Hackers have developed ways of trying
A virus is a computer program that is usually to find out as much information about
hidden within another program or file. It can somebody as possible in an attempt to
replicate itself into other programs or files, guess their passwords. For example, if
which are then often passed between you met somebody and they asked you
users/computers, or transmitted over networks. who your favourite sports team is, what
Viruses exist to cause harm, often damaging or month your birthday is in or what city
deleting data without the owner’s consent. Even you were born in, you would probably
small changes to a computer’s operating-system not consider this to be sinister. However,
files can be devastating to the system and cause the hacker could use this information to
it to malfunction. One of the best-known viruses try to guess your passwords.
was the ILOVEYOU bug. In the year 2000, millions • Hackers may also try to use ‘forgotten
of people received the virus via email, with the password’ tools to answer secret
subject line ‘I love you’. It overwrote important questions that would give them the
operating-system files and replicated itself opportunity to reset a password.
multiple times. It is estimated to have cost users
a total of $15 billion in damages. • Cracking passwords (brute-force)
2. Keeping your network Safe Firewalls examine all the data entering and
leaving a network to check that they do not
1. Antivirus software break any rules. For example, a rule could be set
so that devices from outside the network are not
These are programs designed to prevent viruses
allowed to access devices within the network.
from opening and infecting files on computers by
Other rules may include preventing certain types
performing real-time scans of chunks of data
of file from being received or filtering access to
coming into a device to detect whether they
specific internet sites. Network administrators
have been infected with a virus.
spend a lot of time deciding on the rules that
The software also regularly scans the computer, should be in place for the network that they are
tablet or smartphone for files that could be working on.
harmful. Antivirus software uses large databases
of code that it looks for in files to see whether
they match known threats or look harmful.