1. N e t w o r k s e c u r i t y
t h r e a t
C r eated by = Avinas h
Komal
2. WHAT IS
NETWORK
SECURITY
THREAT ??
Network threats are unlawful or malicious
activities that intend to take advantage of
network vulnerabilities. The goal is to
breach, harm, or sabotage the information
or data valuable to the company.
3. Types of threat
MALWARE
VIRUSES
WORMS
TROJANS
ZOMBIE COMPUTER
BOTNETS
SPYWARE
PHISHING
DENIAL OF SERVICE
4. 4
A) MALWARE
o It is a file or code , typically delivered over a network that infectes , explores
, steals or conducts virtually any behaviour an attacker wants .Though varied
in type and capabities ,malware usually has one of the following objectives:
: provide remote control to an attacker to us infected machine
: send spam from infected machine to unsuspected target
: investigate infected user local network
: steal sensitive data
5. o Malware is an inclusive term for all types of malicious software such as :
cyber bullying
stranger danger
digital footprints
6. B) VIRUSES
o These are the programs that copy themselves throughout a computer or
network .Viruses can only be activated hen a user opens the program . At
their worst , viruses can corrupt or delete data ,use the user’s email to
spread , or erase everything on the hard disk .
o If not checked , a virus can damage system or specific file which are
important for functioning of an operating system .
o It may also slow down your computer as a result of replication of virus in the
background without being visible .
7. C)WORMS
o These are self replicating viruses that exploit security vulnerabilities to
automatically spread themselves across computes and networks .
o Unlike many virus , worms do not attach to exiting programs or alter files .
They typically go unnoticed until replication reaches a scale that consume
significant system resources or network bandwidth .
8. D) TROJANS
o Malware disguised in what appears to be ligetimate software are know as
trojans .Once activated , trojans will conduct whatever action they have been
programmed to carry out .
o Unlike viruses and worms, Trojans do not replicate or reproduce through
infection .
9. E) ZOMBIE COMPUTERS
o In computer science , a zombie is a computer connected to the internet that
has been compromised by a hacker , computer virus or trojan horse can be
used to perform malicious task under remote direction .
o Zeus ,Koobface ,TidServ ,Hamweg etc. are few examples of botnets that have
been used for distributed denial of service(DDoS) attacks , spam , phishing ,
information theft and distributing other malware.
10. F) BOTNETS
o They are often used to spread email spam and launch Denial Of Service
attacks .
o Most owners of zombie computers are unware that their system is being
used in the way
11. G) SPYWARE
o Malware that collects information about the usage of the infected machine
and communicates it back to attacker is known as spyware
o It mostly gets installed on pc without your consent . It finds its way to pc’s
by “piggybacking” onto a file , or gets downloaded from internet when you
visit a particular website .
12. H)PHISHING
o It is the attempt to acquire sensitive information such as usernames ,
passwords etc. . By masquerading as a trustworthy entity in an electronic
communication .
o It often occur through emails and instant messaging and may contain links to
website that directs the user to share private information .
o These fakes websites are often designed to look identical to their legitimate
counterparts to avoid susception of the user using that website at that
particular instant of time.
13. I) DENIAL OF SERVICE (DOS)
ATTACKS
o These attacks are those attacks that prevents legitamte users from accessing
using resources and information .
o Types are as follows:
Denial of Access to Information
Denial of Access to Application
Denial of Access to Resources
Denial of Access to Website