Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CSS 10 - Lesson 3

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

NETWORK

SECURITY
Quarter 4 – Lesson 3
You need to understand computer and network
security. Failure to implement proper security
procedures can affect users, computers, and the
general public. Private information, company
secrets, financial data, computer equipment, and
ítems about national security are placed at risk if
proper security procedures are not followed.
Computer and network security help keep data
and equipment safe by giving only the
appropriate people Access. Everyone in an
organization should give high priority to
security, because everyone can be affected by
a breach in security.
An attack that intentionally degrades the
performance of a computer or network can also
harm an organization’s productivity. Poorly
implemented security measures that allow
unauthorized Access to Wireless network devices
demonstrate that physical connectivity is not
necessary for security breaches by intruders.
How man in the middle attacks
work
SECURITY
ATTACKS
To successfully protect computers and the
network,
a technician must understand both of the
following types of threats to computer
security.
0
PHYSICAL
1 Events or attacks that steal, damage,
or destroy such equipment as servers,
switches and wiring.
0
DATA
2 Events or attacks that remove,
corrupt, deny Access to, allow
Access to, or steal information.
THREATS TO SECURITY CAN
COME FROM INSIDE OR
OUTSIDE AN ORGANIZATION,
AND THE LEVEL OF
POTENTIAL DAMAGE CAN
VARY GREATLY. POTENTIAL
THREATS INCLUDE THE
INTERNAL: Employees who have
FOLLOWING:
Access to data, equipment, and the
network.
Internal attacks can be characterized as
follows:

Malicious threats Accidental threats


are when an are when the user
employee intends damages data or
to cause damage. equipment
unintentionally.
THREATS TO SECURITY CAN
COME FROM INSIDE OR
OUTSIDE AN ORGANIZATION,
AND THE LEVEL OF
POTENTIAL DAMAGE CAN
VARY GREATLY. POTENTIAL
THREATS INCLUDE THE
EXTERNAL: Users outside an organization who do not
FOLLOWING:
have authorized Access to the network or resources.
EXternal attacks can be characterized as follows:

Unstructured attacks, which Structured attacks,


use available resources, such which use code to
as passwords or scripts, to access operating
gain access to and run systems and
programs designed to
software.
vandalize.
Physical loss or damage to equipment can be
expensive, and data los can be detrimental to
your business and reputation. Threats against
data are constantly changing as attackers find
new ways to gain entry and commit their
crimes.
Types of
computer
threats
There are several kinds of threats circulating in
the online world. These three are the most
common threats:
VIRUSES
 Virus is attached to small
pieces of computer code,
software, or document.
 The virus executes when
the software is run on a
computer.
 If the virus spreads to other
computers, those
computers could continue
to spread the virus.
VIRUSES
 A virus is transferred to
another computer through
email, file transfers, and
instant messaging.
 The virus hides by
attaching itself to a file on
the computer.
 When the file is accessed,
the virus executes and
infects the computer.
 A virus has a potential to corrupt or even
delete files on your computer.
WORM
 A worm is a self-
replicating program
that is harmful to
networks.
 A worm uses the
network to duplicate its
code to the hosts on a
network, often without
any user intervention.
TROJAN HORSES
 A Trojan horse
technically is a worm.
 It does not need to be
attached to other software.
 Instead, a Trojan threat is
hidden in software that
appears to do one thing, and
yet behind the scenes it does
another.
Security
procedure
s
Regular testing provides details of any posible
weaknesses in the current security plan that
should be addressed.
A network has multiple layers of security,
including physical, Wireless and data.
VIRUS PROTECTION SOFTWARE
 known as antivirus
software, is software
designed to detect,
disable, and remove
viruses, worms, and
trojans before they can
infect a computer.
VIRUS PROTECTION SOFTWARE
 known as antivirus
software, is software
designed to detect,
disable, and remove
viruses, worms, and
trojans before they can
infect a computer.
THANK
YOU!
Do you have
any questions? Por favor, conserva esta
diapositiva para atribuirnos

CRÉDITOS: Esta plantilla de presentación fue creada por Slidesgo, que


incluye iconos de Flaticon e infografías e imágenes de Freepik

You might also like