0% found this document useful (0 votes)
12 views

Network Threats and Security

Uploaded by

ump75674
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Network Threats and Security

Uploaded by

ump75674
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Network threats and security presses on the keyboard may be sent to the
hacker. This means that the hacker could
Previously, we learnt that how different discover the keystrokes of passwords, giving
scenarios call for different network types, them access to confidential login details.
including WAN, LAN, MAN. We also
differentiated between wired and wireless 4. Unauthorised access
networks. There are a number of ways in which hackers
Irrespective of the type of network used, may try to gain access to computers and systems
networks can are constantly exposed to several that they should not have access to.
threats. This includes the following threats: • Social engineering
1. Viruses • Hackers have developed ways of trying
A virus is a computer program that is usually to find out as much information about
hidden within another program or file. It can somebody as possible in an attempt to
replicate itself into other programs or files, guess their passwords. For example, if
which are then often passed between you met somebody and they asked you
users/computers, or transmitted over networks. who your favourite sports team is, what
Viruses exist to cause harm, often damaging or month your birthday is in or what city
deleting data without the owner’s consent. Even you were born in, you would probably
small changes to a computer’s operating-system not consider this to be sinister. However,
files can be devastating to the system and cause the hacker could use this information to
it to malfunction. One of the best-known viruses try to guess your passwords.
was the ILOVEYOU bug. In the year 2000, millions • Hackers may also try to use ‘forgotten
of people received the virus via email, with the password’ tools to answer secret
subject line ‘I love you’. It overwrote important questions that would give them the
operating-system files and replicated itself opportunity to reset a password.
multiple times. It is estimated to have cost users
a total of $15 billion in damages. • Cracking passwords (brute-force)

2. Ransomware Brute-force attacks are a technique


hackers use to try to gain access to
Ransomware is a type of software designed to computer systems or network devices.
block access to the files on a computer system Hackers use very large ‘dictionary’ files
until somebody pays a ransom. Ransomware that contain millions of words or known
called ‘WannaCry’ targeted users of Windows passphrases and they try every
operating systems and told them that they had combination until they find the correct
to pay a fee, otherwise all their files would be password. Hackers use computer
encrypted and deleted, making them impossible programs that are able to try millions of
to recover. This hit around 230,000 computers different passwords every second to
globally, including hospitals and doctors’ crack passwords automatically. • The
surgeries. most commonly used known passwords
3. Spyware are often at the start of the dictionary
files, and can be cracked very quickly
Spyware monitors the target computer’s actions.
For example, details of the keys that the user
viruses, users download spyware unwittingly,
often from email attachments or free software
downloads. Anti-spyware looks for software
such as adware and trojans. When it detects
threats, it removes them from the system and
informs the user.
Other threats include
3. Firewalls
DDoS attacks
These are software and hardware designed to
Phishing Scams
keep networks safe by limiting the access that
Pharming Scams devices have to networks.

Firewalls usually sit between the LAN and the


WAN and prevent unauthorised users from
accessing a network.

2. Keeping your network Safe Firewalls examine all the data entering and
leaving a network to check that they do not
1. Antivirus software break any rules. For example, a rule could be set
so that devices from outside the network are not
These are programs designed to prevent viruses
allowed to access devices within the network.
from opening and infecting files on computers by
Other rules may include preventing certain types
performing real-time scans of chunks of data
of file from being received or filtering access to
coming into a device to detect whether they
specific internet sites. Network administrators
have been infected with a virus.
spend a lot of time deciding on the rules that
The software also regularly scans the computer, should be in place for the network that they are
tablet or smartphone for files that could be working on.
harmful. Antivirus software uses large databases
of code that it looks for in files to see whether
they match known threats or look harmful.

If it detects a file as harmful, the antivirus


software will try to quarantine the file and let the
user know that a virus has been detected. The
user can then decide whether to delete the file. 4. Use Strong, Unique Passwords
To be effective in preventing viruses, users need • Create complex passwords that include
to keep antivirus software up to date a combination of letters (upper and
2. Anti-spyware/anti-ransomware software lower case), numbers, and special
characters.
These programs regularly scans for files that
could be troublesome to the user. Spyware is • Avoid using easily guessable information
often more difficult to detect because it installs like names or birthdates.
tools that are not always damaging to a user’s • Use different passwords for different
computer, but which covertly enable hackers to accounts and services.
spy on people using their devices. Similarly to
5. Enable Two-Factor Authentication (2FA)
Extended Learning
• Add an extra layer of security by
The internet and networks have made the world
enabling 2FA, which requires users to
a global village. One way through which
provide two forms of verification (e.g.,
networks and the internet can be applied in
password and a code sent to a phone).
today’s world is through the Internet of Things.
6. Use a Virtual Private Network (VPN)
For your research, do the following:
A VPN encrypts internet traffic, making it difficult
1. Define what is meant by the Internet of
for attackers to intercept or track online
Things
activities.
2. Explore at least 10 examples of devices
7. Use Proxy Servers for Anonymity and Privacy that use IoT and describe how they work
and the risks associated with them.
Proxy servers serve as a "middleman" between a
Present this in a table format as shown
user and the web. They hide the user's IP address
below.
from a web server the user visits, but it does not
secure the data that is sent and received. Technology Benefits Risks
Benefits:
Smart You can clearly see who If this system was
• Anonymity: Proxy servers act as doorbells/ has called at your home hacked, the
intermediaries between a user’s device cameras without having to information or
and the internet. When using a proxy, answer the call. You can footage from within
your IP address is hidden, and the often see them in HD a home could be
proxy’s IP address is displayed instead. and also speak or accessed and used
This makes it harder for websites, communicate with to spy or extort a
advertisers, and attackers to track your them. This would be a person or it could be
location or browsing habits. useful safeguard against used to find out
unauthorised entry to a when someone is
• Bypass Geo-Restrictions: Proxies can be
home. Also this can be not at home, so the
used to bypass regional restrictions by
done via apps on many home can be
masking your real location and making it
systems and so will help targeted when no
appear as though you're browsing from
to secure a home when one is there.
a different country. This can also help in
you are away from the
avoiding censorship in certain regions.
home.

The figure above illustrates connecting to the


internet without and with a proxy server.

You might also like