Unit 2 Assignment 2. Software Utilities?

Similar documents
Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

SECURING INFORMATION SYSTEMS

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Ethical Hacking and Prevention

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Elementary Computing CSC 100. M. Cheng, Computer Science

Discovering Computers Fundamentals, 2011 Edition. Living in a Digital World

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Firewalls, Tunnels, and Network Intrusion Detection

Computer Hacking Forensics Investigator

Discovering Computers Living in a Digital World

4 Information Security

Seqrite Antivirus for Server

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

F9A0 04 (ESKINT2): Using the Internet 2

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Chapter 1 B: Exploring the Network

SUMMARIES OF INTERACTIVE MULTIMEDIA

INDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Chapter 4. Network Security. Part I

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

EXECUTIVE REPORT 20 / 12 / 2006

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Securing Information Systems

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Introduction to Security. Computer Networks Term A15

Training UNIFIED SECURITY. Signature based packet analysis

Seqrite Endpoint Security

Computer Security. Solutions

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction

A Review Paper on Network Security Attacks and Defences

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

NHS South Commissioning Support Unit

Chapter 11: Networks

Online Security and Safety Protect Your Computer - and Yourself!

Cracked BitDefender Security for File Servers 2 Years 55 PCs pc repair software for free ]

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

Get Max Internet Security where to buy software for students ]

CIH

A. Carcano, I. Nai Fovino, M. Masera, A. Trombetta European Commission Joint Research Centre Critis 2008, Rome, October 15, 2008

CTS2134 Introduction to Networking. Module 08: Network Security

Malware, , Database Security

BCS Level 4 Certificate in Network Security QAN 603/0546/0

Cyber Security Practice Questions. Varying Difficulty

McAfee Internet Security Suite Quick-Start Guide

Client Guide for Symantec Endpoint Protection Small Business Edition

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Security Gap Analysis: Aggregrated Results

Ethical Hacking. Content Outline: Session 1

Advanced Diploma on Information Security

Zillya Internet Security User Guide

Cisco Systems Korea

Future-ready security for small and mid-size enterprises

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Table of Contents. Chapter One. Domain 1.0: Systems Security... 1 Practice Questions... 1 Quick-Check Answer Key Answers and Explanations...

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

ANATOMY OF AN ATTACK!

Systems and Network Security (NETW-1002)

Cyber Security Audit & Roadmap Business Process and

Systems and Principles Unit Syllabus

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Introducing the CSC SSM

NIP6000 Next-Generation Intrusion Prevention System

Huawei NIP2000/5000 Intrusion Prevention System

CompTIA Security+(2008 Edition) Exam

ACM Retreat - Today s Topics:

Chapter 11: It s a Network. Introduction to Networking

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

Acceptable Use Policy

CompTIA E2C Security+ (2008 Edition) Exam Exam.

BruNet NETWORK & SECURITY. Pg Hj Zuhairi bin Pg Hj Jamaludin Head of BruNet Technical Services Jabatan Telekom Brunei

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

UTM 5000 WannaCry Technote

Cisco 1: Networking Fundamentals

Cyber Security Guide for NHSmail

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Venusense UTM Introduction

Acceptable Use Policy

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Symantec Client Security. Integrated protection for network and remote clients.

SECURING YOUR HOME NETWORK

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Transcription:

1 Unit 2 Assignment 2 Software Utilities?

OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats. Identify different methods of attack. Describe the features of a firewall and how it can be used to protect against an attack. Software Utilities? 2

SOFTWARE UTILITIES? Can be defined as A broad range of system software designed to help gather information, configure, optimise and maintain a Computer System. Software Utilities? 3

EXAMPLES OF SOFTWARE UTILITIES? Firewall Virus protection Clean up tools Drive Formatting/compression Software Utilities? 4

TASK Task 1 - research the following tools 1. Firewall 2. Virus protection 3. Clean up tools 4. Drive Formatting/compression Task 2 - Why do we use each of these tools? What are their functions What are the strengths and weaknesses Software Utilities? 5

THE PURPOSE OF GIVEN SOFTWARE UTILITIES Firewall Monitor and control traffic to and from a computer system Virus protection Monitor the computer system to prevent, detect and remove malware Clean up tools Removes cookies and temporary files Drive formatting /Compression Prepare a hard disk for use, provide a File System Shrink the disk space used by a partition Software Utilities? 6

POTENTIAL NETWORK THREATS Describe risks of network intrusion Software Utilities? 7

NETWORKING THREATS Define the sources of network intrusion. Software Utilities? 8

NETWORKING THREATS Describe social engineering and phishing Example Software Utilities? 9

METHODS OF ATTACK Describe viruses, worms, and Trojan horses. Virus Worm Trojan Horse Software Utilities? 10

METHODS OF ATTACK Describe viruses, worms, and Trojan horses. Virus Requires a Host to spread. Worm Able to Self replicate. Trojan Horse - Comes in disguised as a genuine software or added to genuine software. Software Utilities? 11

METHODS OF ATTACK Denial of Service and Brute Force attacks Software Utilities? 12

OTHER MALWARE Spyware Tracking cookies Adware Popup Task Determine the difference between these. Software Utilities? 13

SPAM Unsolicited email Typically commercial 1. Dictionary attacks 2. Search the Internet And web pages for @ sign. 3. Gained from newsgroups and chat rooms Commercial business exist offer a spamming service Anti Spam software Software Utilities? 14

SECURITY PROCEDURES AND APPLICATIONS Define common security procedures Software Utilities? 15

PHISHING EXAMPLES Gum Tree Phishing examples How to spot phishing Software Utilities? 16

FIREWALL FEATURES AND HOW TO USE THEM TO PROTECT AGAINST AN ATTACK What is a firewall? Hardware/Software PC or router based One or two way? Software Utilities? 17

LAYERS WITH TCP/IP AND OSI MODEL The firewall operates within the TCP/IP layers. Monitors and blocks based on Port numbers (OSI Layer 4) Software Utilities? 18

APPLICATIONS AND LINKS TO PORT NUMBERS Application layer name Port number DNS 53 EMAIL 25,110,143 FTP 21 Web Server 80 Packet Tracer exercise Stud share week 6 Software Utilities? 19

FIREWALL TASK Assignment 2 - Outcome P8 will be carried out within this assignment evidenced by witness statement. To achieve this carry out all tasks on the witness statement and complete the written tasks, upload these to Turnitin as evidence. Software Utilities? 20

SUMMARY Computer and networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective security is based on a variety of products and services. A Firewall controls traffic between networks and helps prevent unauthorized access. Software Utilities? 21