Consist of the provisions and policies adopted by a network administrator to prevent and monitor unauthorised access, misuse, modification or denial of a computer network and network accessible resources.
Network Security: Certificates
Client Security Issues
Phishing
- Attacks are performed with the intention to acquire personal information like credit card numbers, bank account, etc.
- The recipients are encouraged to enter personal identification data.
- Mocking the web presences of trusted corporations with the intention to trick customers.
- Use convincing websites, email designs and URLs
Desktop Security Issues
Adware
- Programs used to deliver advertising contents.
- Visible to the user, experienced to be annoying.
Spyware
- Intends to remain unrecognised.
- Used to gather personal info like login details, etc
- Spyware monitors the user's activities and scan the system.
Viruses
- Attached to executable files or documents
- Spread through sharing of infected files or sending emails with viruses contained in the attachment
- Some can cause further damage to the systems
Worm
- Programs that can replicate or copy themselves.
Trojan Horses
- Do not replicate themselves but typically cause damage or compromise of security of infected computers
- Appears to be useful software and often offer the pretended useful functionality
- Damage caused varies – include data theft and destruction or illegitimate access
No comments:
Post a Comment