1 Unit 2 Assignment 2 Software Utilities?
OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats. Identify different methods of attack. Describe the features of a firewall and how it can be used to protect against an attack. Software Utilities? 2
SOFTWARE UTILITIES? Can be defined as A broad range of system software designed to help gather information, configure, optimise and maintain a Computer System. Software Utilities? 3
EXAMPLES OF SOFTWARE UTILITIES? Firewall Virus protection Clean up tools Drive Formatting/compression Software Utilities? 4
TASK Task 1 - research the following tools 1. Firewall 2. Virus protection 3. Clean up tools 4. Drive Formatting/compression Task 2 - Why do we use each of these tools? What are their functions What are the strengths and weaknesses Software Utilities? 5
THE PURPOSE OF GIVEN SOFTWARE UTILITIES Firewall Monitor and control traffic to and from a computer system Virus protection Monitor the computer system to prevent, detect and remove malware Clean up tools Removes cookies and temporary files Drive formatting /Compression Prepare a hard disk for use, provide a File System Shrink the disk space used by a partition Software Utilities? 6
POTENTIAL NETWORK THREATS Describe risks of network intrusion Software Utilities? 7
NETWORKING THREATS Define the sources of network intrusion. Software Utilities? 8
NETWORKING THREATS Describe social engineering and phishing Example Software Utilities? 9
METHODS OF ATTACK Describe viruses, worms, and Trojan horses. Virus Worm Trojan Horse Software Utilities? 10
METHODS OF ATTACK Describe viruses, worms, and Trojan horses. Virus Requires a Host to spread. Worm Able to Self replicate. Trojan Horse - Comes in disguised as a genuine software or added to genuine software. Software Utilities? 11
METHODS OF ATTACK Denial of Service and Brute Force attacks Software Utilities? 12
OTHER MALWARE Spyware Tracking cookies Adware Popup Task Determine the difference between these. Software Utilities? 13
SPAM Unsolicited email Typically commercial 1. Dictionary attacks 2. Search the Internet And web pages for @ sign. 3. Gained from newsgroups and chat rooms Commercial business exist offer a spamming service Anti Spam software Software Utilities? 14
SECURITY PROCEDURES AND APPLICATIONS Define common security procedures Software Utilities? 15
PHISHING EXAMPLES Gum Tree Phishing examples How to spot phishing Software Utilities? 16
FIREWALL FEATURES AND HOW TO USE THEM TO PROTECT AGAINST AN ATTACK What is a firewall? Hardware/Software PC or router based One or two way? Software Utilities? 17
LAYERS WITH TCP/IP AND OSI MODEL The firewall operates within the TCP/IP layers. Monitors and blocks based on Port numbers (OSI Layer 4) Software Utilities? 18
APPLICATIONS AND LINKS TO PORT NUMBERS Application layer name Port number DNS 53 EMAIL 25,110,143 FTP 21 Web Server 80 Packet Tracer exercise Stud share week 6 Software Utilities? 19
FIREWALL TASK Assignment 2 - Outcome P8 will be carried out within this assignment evidenced by witness statement. To achieve this carry out all tasks on the witness statement and complete the written tasks, upload these to Turnitin as evidence. Software Utilities? 20
SUMMARY Computer and networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals. Effective security is based on a variety of products and services. A Firewall controls traffic between networks and helps prevent unauthorized access. Software Utilities? 21