SlideShare a Scribd company logo
1 of 30
ystem
Security
S
System
A system refers to a collection of interrelated components
that work together to achieve a specific goal or purpose.
It can be a physical or conceptual entity designed to perform
a set of functions or tasks.
System Security
System security refers to protect a computer system or an information
system from unauthorized access, misuse and damage.
Security is a pre-condition for confidentiality, integrity, and availability of
system resources, data, and services.
Security is one of most important as well as the major task in order to
keep all the threats or other malicious tasks or attacks or program away
from the computer’s software system.
Security threats
1
2
The security of a system can be threatened via two violations:
Threat:
A program that has the potential to cause serious damage to
the system.
Attack:
An attempt to break security and make unauthorized use of an
asset.
Threats
Program Threats:
A program was written by a cracker to break the security or to change
the behavior of a normal process. In other words, if a user made program
to perform some malicious unwanted tasks, then it is known as
Program Threats.
Threats can be classified into the following two categories:
System Threats:
These threats involve the abuse of system services.
They try to create a situation in which operating-system resources
and user files are misused.
Malicious Program
A malicious program, also known as malware, refers to software or
code specifically designed to cause harm, break security, or carry out
malicious activities on computer systems, networks, or devices without
the knowledge of the user.
Malicious programs are created by hackers with the intention of steal
sensitive information, gain unauthorized access, or disrupt normal
system operations.
Malicious Program Types
Two most common known categories of malicious program
are virus and worms:
Viruses:
These program cannot run independently.
It requires the host program to run and active them.
It attaches itself to formal files or programs and
modify them to include a copy of itself.
Viruses can cause damage, modify or delete files.
Worms:
These program can run independently.
It can replicate themselves and spread across
networks without requiring a host file. Worms can
consume network resources, and infect multiple
systems rapidly.
Malicious Program Types
3
4
5
Trojans:
Trojans are malicious programs that perform some harmless activities
in addition to malicious activities. A Trojan horse is a program with some
known effects and some unexpected effects.
Trojans can perform various malicious actions, such as stealing sensitive
information, creating backdoors for unauthorized access, or launching other malware.
Spyware:
Spyware is a software that is used to monitor and collect
information about a user's activities, such as browsing habits, and passwords.
Spyware can transmit this information to third parties without the user's
knowledge or consent.
Adware:
This is the Malware that displays unwanted and intrusive advertisements on a
user's system, often bundled with software installations. Adware can track user
behavior and generate revenue for the attacker through advertising.
Worms
A worm virus refers to a malicious program that replicates itself,
automatically spreading through a network.
In this definition of computer worms, the worm virus exploits
vulnerabilities in your security software to steal sensitive information,
install backdoors that can be used to access the system, corrupt files,
and do other kinds of harm.
A worm is different from a virus, however, because a worm can operate
on its own while a virus needs a host computer.
Worms Types
Types of Computer Worms:
Email-Worm
An email-worm refers to a worm that is able to copy
itself and spread through files attached to email
messages.
IM-Worm
An Instant Messenger (IM) worm is a kind of worm that
can spread through IM networks. When an IM-worm is
operating, it typically finds the address book belonging
to the user and tries to transmit a copy of itself to all of
the person’s contacts.
Worms Types
IRC-Worm
An IRC-worm makes use of Internet Relay Chat (IRC)
networks to send itself over to other host machines.
An IRC-worm drops a script into the IRC’s client
directory within the machine it infects.
Net-Worm
A net-worm refers to a kind of worm that can find new
hosts by using shares made over a network.
This is done using a server or hard drive that multiple
computers access via a local-area network (LAN).
Worms Types
P2P-Worm
A P2P-worm is spread through peer-to-peer (P2P)
networks. It uses the P2P connections to send copies
of itself to users.
Virus
Computer virus refers to a program which damages computer systems
and/or destroys or erases data files. A computer virus is a malicious
program that self-replicates by copying itself to another program.
In other words, the computer virus spreads by itself into other executable
code or documents. The purpose of creating a computer virus is to gain
admin control and steal user sensitive data.
Hackers design computer viruses and shoot on online users by
cheating them.
Symptoms
Letter looks like they are falling to
the bottom of the screen.
The computer system becomes slow.
The size of available free memory
reduces.
The hard disk runs out of space.
The computer does not boot.
Components of a Virus
1
3
Infection Mechanism:
Viruses have a mechanism to infect host files or
programs. They can attach themselves to executable
files, scripts, or other areas of the system.
Trigger:
Viruses have a trigger condition that determines when the
malicious code should execute. This trigger can be based
on a specific date, user action, system event, or other
conditions.
2
Payload:
The payload of a virus refers to the malicious code or
actions it performs on an infected system. Including
damaging files, stealing information, displaying messages,
or creating backdoors for unauthorized access.
Virus Types
Types of Computer Virus:
Executable File Infector –
These are the executable (.COM or .EXE execution
starts at first instruction). Propagated by attaching
itself to particular file or program. Generally resides
at the start (prepending) or at the end (appending)
of a file.
Boot Sector –
Spread with infected floppy or pen drives used to boot
the computers. During system boot, boot sector virus is
loaded into main memory and destroys data stored in
hard disk, e.g. Polyboot, Disk killer, Stone, AntiEXE.
Virus Types
Polymorphic –
Changes itself with each infection and creates multiple
copies. Multipartite: use more than one propagation
method. Difficult for antivirus to detect this virus.
Three major parts: Encrypted virus body, Decryption
routine varies from infection to infection, and Mutation
engine.
Overwrite viruses -
Some viruses are designed
specifically to destroy a file or application's data. After
infecting a system, an overwrite virus begins overwriting
files with its own code. These viruses can target specific
files or applications or systematically overwrite all files
on an infected device.
Virus Types
Macro –
Associated with application software like word and excel.
When opening the infected document, macro virus is
loaded into main memory and destroys the data stored in
hard disk.
Hybrids –
Features of various viruses are combined,
e.g. Happy99 (Email virus).
Firewall
Firewalls prevent unauthorized access to networks through software
or firmware. By utilizing a set of rules, the firewall examines and blocks
incoming and outgoing traffic.
A firewall welcomes only those incoming traffic that has been configured
to accept. It distinguishes between good and malicious traffic and either
allows or blocks specific data packets on pre-established security rules.
How does it works?
For example, the image depicted below shows how a firewall allows good traffic to pass to the user’s private
network.
Fig: Firewall allowing Good Traffic
How does it works?
However, in the example below, the firewall blocks malicious traffic from entering the private network, thereby
protecting the user’s network from being susceptible to a cyberattack.
Fig: Firewall blocking Bad Traffic
Firewall Types
1
2
There are different types of firewalls:
Packet Filtering Firewall:
Packet filtering firewalls examine individual packets of
network traffic based on predefined rules.
Circuit-Level Firewall:
Circuit-level firewalls operate at the transport layer of the
network stack and monitor network connections, rather
than individual packets.
Application Layer Firewall:
Application layer firewalls operate at the highest layer of the
network stack and can inspect and filter traffic based on
application-specific protocols.
3
Packet Filtering Firewall
Advantages:
Simple and efficient method for filtering traffic.
Low impact on network performance.
Can filter traffic based on source/destination IP
addresses, port numbers, and protocols.
Packet Filtering Firewall
Disadvantages:
Limited ability to inspect the contents of packets.
Vulnerable to certain types of attacks, such as IP
spoofing or tunneling through allowed ports.
Circuit level Firewall
Advantages:
Can authenticate and authorize connections based
on session-level information.
Offers enhanced security compared to packet filtering
by ensuring that connections are legitimate and valid.
Provides better protection against attacks targeting the
transport layer.
Circuit level Firewall
Disadvantages:
Lacks the ability to inspect packet contents.
Does not offer granular control over specific application
protocols.
Application Layer Firewall
Advantages:
Provides granular control and deep inspection of
application protocols and data.
Can detect and block specific application-level threats.
Offers advanced security features, such as content
filtering, intrusion prevention, and data loss prevention.
Application Layer Firewall
Disadvantages:
Higher resource requirements and potential impact on
network performance due to deep packet inspection.
May require more configuration and maintenance
compared to lower-level firewalls.
Susmita Rani Saha
ID-B180305047
CSE,JnU
THANK YOU

More Related Content

What's hot

What's hot (20)

Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
System Security
System SecuritySystem Security
System Security
 
Network security
Network securityNetwork security
Network security
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Secure Code Warrior - Poor authorization and authentication
Secure Code Warrior - Poor authorization and authenticationSecure Code Warrior - Poor authorization and authentication
Secure Code Warrior - Poor authorization and authentication
 
Melissa Virus
Melissa VirusMelissa Virus
Melissa Virus
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Web security
Web securityWeb security
Web security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Browser security
Browser securityBrowser security
Browser security
 

Similar to System_security.pptx

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 

Similar to System_security.pptx (20)

Mitppt
MitpptMitppt
Mitppt
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
UNIT-4.docx
UNIT-4.docxUNIT-4.docx
UNIT-4.docx
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Computer security
Computer securityComputer security
Computer security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Software security
Software securitySoftware security
Software security
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Protection and security
Protection and securityProtection and security
Protection and security
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

System_security.pptx

  • 2. System A system refers to a collection of interrelated components that work together to achieve a specific goal or purpose. It can be a physical or conceptual entity designed to perform a set of functions or tasks.
  • 3. System Security System security refers to protect a computer system or an information system from unauthorized access, misuse and damage. Security is a pre-condition for confidentiality, integrity, and availability of system resources, data, and services. Security is one of most important as well as the major task in order to keep all the threats or other malicious tasks or attacks or program away from the computer’s software system.
  • 4. Security threats 1 2 The security of a system can be threatened via two violations: Threat: A program that has the potential to cause serious damage to the system. Attack: An attempt to break security and make unauthorized use of an asset.
  • 5. Threats Program Threats: A program was written by a cracker to break the security or to change the behavior of a normal process. In other words, if a user made program to perform some malicious unwanted tasks, then it is known as Program Threats. Threats can be classified into the following two categories: System Threats: These threats involve the abuse of system services. They try to create a situation in which operating-system resources and user files are misused.
  • 6. Malicious Program A malicious program, also known as malware, refers to software or code specifically designed to cause harm, break security, or carry out malicious activities on computer systems, networks, or devices without the knowledge of the user. Malicious programs are created by hackers with the intention of steal sensitive information, gain unauthorized access, or disrupt normal system operations.
  • 7. Malicious Program Types Two most common known categories of malicious program are virus and worms: Viruses: These program cannot run independently. It requires the host program to run and active them. It attaches itself to formal files or programs and modify them to include a copy of itself. Viruses can cause damage, modify or delete files. Worms: These program can run independently. It can replicate themselves and spread across networks without requiring a host file. Worms can consume network resources, and infect multiple systems rapidly.
  • 8. Malicious Program Types 3 4 5 Trojans: Trojans are malicious programs that perform some harmless activities in addition to malicious activities. A Trojan horse is a program with some known effects and some unexpected effects. Trojans can perform various malicious actions, such as stealing sensitive information, creating backdoors for unauthorized access, or launching other malware. Spyware: Spyware is a software that is used to monitor and collect information about a user's activities, such as browsing habits, and passwords. Spyware can transmit this information to third parties without the user's knowledge or consent. Adware: This is the Malware that displays unwanted and intrusive advertisements on a user's system, often bundled with software installations. Adware can track user behavior and generate revenue for the attacker through advertising.
  • 9. Worms A worm virus refers to a malicious program that replicates itself, automatically spreading through a network. In this definition of computer worms, the worm virus exploits vulnerabilities in your security software to steal sensitive information, install backdoors that can be used to access the system, corrupt files, and do other kinds of harm. A worm is different from a virus, however, because a worm can operate on its own while a virus needs a host computer.
  • 10. Worms Types Types of Computer Worms: Email-Worm An email-worm refers to a worm that is able to copy itself and spread through files attached to email messages. IM-Worm An Instant Messenger (IM) worm is a kind of worm that can spread through IM networks. When an IM-worm is operating, it typically finds the address book belonging to the user and tries to transmit a copy of itself to all of the person’s contacts.
  • 11. Worms Types IRC-Worm An IRC-worm makes use of Internet Relay Chat (IRC) networks to send itself over to other host machines. An IRC-worm drops a script into the IRC’s client directory within the machine it infects. Net-Worm A net-worm refers to a kind of worm that can find new hosts by using shares made over a network. This is done using a server or hard drive that multiple computers access via a local-area network (LAN).
  • 12. Worms Types P2P-Worm A P2P-worm is spread through peer-to-peer (P2P) networks. It uses the P2P connections to send copies of itself to users.
  • 13. Virus Computer virus refers to a program which damages computer systems and/or destroys or erases data files. A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to gain admin control and steal user sensitive data. Hackers design computer viruses and shoot on online users by cheating them.
  • 14. Symptoms Letter looks like they are falling to the bottom of the screen. The computer system becomes slow. The size of available free memory reduces. The hard disk runs out of space. The computer does not boot.
  • 15. Components of a Virus 1 3 Infection Mechanism: Viruses have a mechanism to infect host files or programs. They can attach themselves to executable files, scripts, or other areas of the system. Trigger: Viruses have a trigger condition that determines when the malicious code should execute. This trigger can be based on a specific date, user action, system event, or other conditions. 2 Payload: The payload of a virus refers to the malicious code or actions it performs on an infected system. Including damaging files, stealing information, displaying messages, or creating backdoors for unauthorized access.
  • 16. Virus Types Types of Computer Virus: Executable File Infector – These are the executable (.COM or .EXE execution starts at first instruction). Propagated by attaching itself to particular file or program. Generally resides at the start (prepending) or at the end (appending) of a file. Boot Sector – Spread with infected floppy or pen drives used to boot the computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk, e.g. Polyboot, Disk killer, Stone, AntiEXE.
  • 17. Virus Types Polymorphic – Changes itself with each infection and creates multiple copies. Multipartite: use more than one propagation method. Difficult for antivirus to detect this virus. Three major parts: Encrypted virus body, Decryption routine varies from infection to infection, and Mutation engine. Overwrite viruses - Some viruses are designed specifically to destroy a file or application's data. After infecting a system, an overwrite virus begins overwriting files with its own code. These viruses can target specific files or applications or systematically overwrite all files on an infected device.
  • 18. Virus Types Macro – Associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk. Hybrids – Features of various viruses are combined, e.g. Happy99 (Email virus).
  • 19. Firewall Firewalls prevent unauthorized access to networks through software or firmware. By utilizing a set of rules, the firewall examines and blocks incoming and outgoing traffic. A firewall welcomes only those incoming traffic that has been configured to accept. It distinguishes between good and malicious traffic and either allows or blocks specific data packets on pre-established security rules.
  • 20. How does it works? For example, the image depicted below shows how a firewall allows good traffic to pass to the user’s private network. Fig: Firewall allowing Good Traffic
  • 21. How does it works? However, in the example below, the firewall blocks malicious traffic from entering the private network, thereby protecting the user’s network from being susceptible to a cyberattack. Fig: Firewall blocking Bad Traffic
  • 22. Firewall Types 1 2 There are different types of firewalls: Packet Filtering Firewall: Packet filtering firewalls examine individual packets of network traffic based on predefined rules. Circuit-Level Firewall: Circuit-level firewalls operate at the transport layer of the network stack and monitor network connections, rather than individual packets. Application Layer Firewall: Application layer firewalls operate at the highest layer of the network stack and can inspect and filter traffic based on application-specific protocols. 3
  • 23. Packet Filtering Firewall Advantages: Simple and efficient method for filtering traffic. Low impact on network performance. Can filter traffic based on source/destination IP addresses, port numbers, and protocols.
  • 24. Packet Filtering Firewall Disadvantages: Limited ability to inspect the contents of packets. Vulnerable to certain types of attacks, such as IP spoofing or tunneling through allowed ports.
  • 25. Circuit level Firewall Advantages: Can authenticate and authorize connections based on session-level information. Offers enhanced security compared to packet filtering by ensuring that connections are legitimate and valid. Provides better protection against attacks targeting the transport layer.
  • 26. Circuit level Firewall Disadvantages: Lacks the ability to inspect packet contents. Does not offer granular control over specific application protocols.
  • 27. Application Layer Firewall Advantages: Provides granular control and deep inspection of application protocols and data. Can detect and block specific application-level threats. Offers advanced security features, such as content filtering, intrusion prevention, and data loss prevention.
  • 28. Application Layer Firewall Disadvantages: Higher resource requirements and potential impact on network performance due to deep packet inspection. May require more configuration and maintenance compared to lower-level firewalls.