assignment3 (1)

11
UNIVERSITI TEKNOLOGI MARA CSC134 – COMPUTER AND INFORMATION PROCESSING ASSIGNMENT 3 PREPARED BY: NAME : NUR SYAHMINA BT. REDUAN STUDENT ID : 2013699644 GROUP : AS1204A PREPARED FOR: MDM SITI NURSAJANA MALIM SUBMISSION DATE: 1

Upload: mohd-syafiq-akmal

Post on 18-Nov-2015

216 views

Category:

Documents


3 download

DESCRIPTION

ertw

TRANSCRIPT

UNIVERSITI TEKNOLOGI MARACSC134 COMPUTER AND INFORMATION PROCESSING

ASSIGNMENT 3

PREPARED BY:NAME:NUR SYAHMINA BT. REDUAN

STUDENT ID:2013699644

GROUP:AS1204A

PREPARED FOR:MDM SITI NURSAJANA MALIM

SUBMISSION DATE: 21 MARCH 2015

CONTENTINTRODUCTION.3TYPES OF INTERNET AND NETWORK ATTACKS.4SIGNS OF INFECTED COMPUTER.5HOW VIRUS CAN SPREAD THROUGH AN E-MAILMESSAGE.6PRECAUTION STEPS TO AVOID INTERNET AND NETWORK ATTACKS.7TYPES OF PROTECTOR SOFTWARE.8REFERENCES.9

Introduction

Definition of internet:Internet is a worldwide collection of network that connects millions of business, government, agencies, educations, institution and individuals.

Definition of networks:Networks are a collection of computer and devices connected together, often wirelessly via communication devices and transmission media.

Definition of internet and network attacks:Internet and network attacks are any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.

Types of Internet and Networks Attacks

1. Computer virus:Attacks a computer negatively by altering the way computer works.

2. Worm:Copies itself repeatedly, using up resources and possibility shutting down the computer or network.

3. Trojan Horse:A malicious program that hides within or looks like a legitimate program.

4. Rootkit:Program that hides in a computer and allows someone from a remote location to take full control.

5. Botnet:A group of compromised computers connected to a network. A compromised computer is known as zombie

6. Denial of service attacks (DoS attacks):Disrupt computer access to Internet services.

7. Back door:A program or set of instructions in a program that allow users to bypass security controls.

8. Spoofing:A technique intruders use to make their network or Internet transmission appear legitimate.Signs of Infected Computer

1. Operating system runs much slower than usual.

2. Available space is less than usual.

3. Files become corrupted.

4. Screen displays unusual message or image.

5. Unknown programs or files mysteriously appear.

6. Programs or files do not work properly.

7. Operating system does not start up.

8. Operating system shuts down unexpectedly.

9. Existing files and programs disappear.

10. Music or unusual sounds play randomly.

11. System properties change.

How Virus Can Spread Through an E-Mail Message

Step 1:Unscrupulous programmers create a virus program that deletes all files. They hide the virus in a word processing document and attach the document to an e-mail messages.

Step 2:They send the e-mail message to thousands of users around the world.

Step 3 (a):Some users open the attachment and the computers become infected with the virus.

Step 3 (b):Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail. Instead, they immediately delete the e-mail message and continue using their computers. These users computers are not infected with the virus.

Precaution Steps to Avoid Internet and Network Attacks

1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.

2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source.

3. Set the macro security in programs so that you can enable or disable macros. Enables macros only if the document is from a trusted source and you are expecting it.

4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.

5. Scan all downloaded programs for viruses and other malware.

6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediately.

7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink wrapped software from majors developers. Some commercial software has been infected and distributed to unsuspecting users.

8. Install a personal firewall program.

9. Stay informed about new virus alerts and virus hoaxes.

Types of Protector Software

FirewallA software that protects a networks resources from intrusion.

Intrusion Detection Software Analyze all network traffics Assesses system vulnerabilities Identifies any unauthorized intrusions Notifies network administrators of suspicious behavior patterns or system breaches.

Honeypot A honeypot is a deception trap, designed to entice an attacker into attempting to compromise the information systems in an organization.

References

http://honeytrap.mwcollect.org/ http://en.wikipedia.org/wiki/Attack_%28computing%29 Discovering Computer 2012: Chapter 11

2