Modern Network
Security Threats
‫المدرب‬:‫م‬/‫إبراهيم‬‫العديني‬
‫المتدربين‬:
‫العمودي‬ ‫رامي‬
‫الدين‬ ‫عماد‬
Submitted
Security curriculum emphasizes core security
technologies, the installation, troubleshooting and
monitoring of network devices to maintain integrity,
confidentiality and availability of data and devices,
and competency in the technologies that uses in its
security structure.
Code Red
Methods of Treatment
Captain Crunch (John Draper)
Polices :
A virus can only spread from one computer to another by:
Sending it over a network as a file or as an email payload.
Carrying it on a removable medium.
A pop-up programs :
A Trojan horse is a program that appears, to the user, to
perform a desirable function but, in fact, facilitates
unauthorized access to the user's computer system.
Hacker
It is a person who penetrates either destroyed or for the
money .
To make the protected network:
Filled firewall
Buy firewall device
Take a copy of your information
Install reliable programs
Continuously update for protection software
CCNAS Ch01

CCNAS Ch01