SlideShare a Scribd company logo
NETWORK
SECURITY
Network Security protects your network and data from breaches,
intrusions and other threats. ... Network Security involves access
control, virus and antivirus software, application security, network
analytics, types of network-related security (endpoint, web, wireless),
firewalls, VPN encryption and more.
INTRODUCTION
Computer and network security help keep data and equipment safe by
giving only the appropriate people access. Everyone in an organization should
give high priority to security, because everyone can be affected by a lapse in
security. Theft, loss, network intrusion, and physical damage are some of the
ways a network or computer can be harmed.
A technician’s primary responsibilities include data and network security.
You may have to repair, adjust, and install equipment. You need to know how to
configure settings to keep the network secure, but still keep it available to those
who need to access it. You will ensure that software patches and updates are
applied, antivirus software is installed, and antispyware software is used. You
may also be asked to instruct users on how to maintain good security practices
with computer equipment.
BACKGROUND INFORMATION FOR LEARNERS
● Physical: Events or attacks that steal, damage, or destroy such
equipment as servers, switches, and wiring.
● Data: Events or attacks that remove, corrupt, deny access to, allow
access to, or steal information.
SECURITY ATTACKS
PHYSICAL ATTACK
DATA ATTACK
Threats to security can come from inside or outside an organization, and the
level of potential damage can vary greatly. Potential threats include the
following:
Internal: Employees who have access to data, equipment, and the network.
Internal attacks can be characterized as follows:
❖ Malicious threats are when an employee intends to cause damage.
❖ Accidental threats are when the user damages data or equipment
unintentionally.
External: Users outside an organization who do not have authorized access to
the network or resources. External attacks can be characterized as follows:
❖ Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed to
vandalize.
❖ Structured attacks, which use code to access operating systems and
software.
MALICIOUS AND ACCIDENTAL THREAT
UNSTRUCTURED ATTACK
STRUCTURED ATTACK
● Virus is attached to small pieces of computer code, software, or
document. The virus executes when the software runs on a
computer.
● Worm is a self-replicating program that is harmful to networks. A
worm uses the network to duplicate its code to the hosts on a
network, often without any user intervention.
● Trojan horse technically is a worm. It does not need to be attached
to other software. Instead, a Trojan threat is hidden in software that
appears to do one thing, and yet behind the scenes it does
another.
TYPES OF MALWARE
VIRUS
8 Examples of
Computer Virus:
1. CryptoLocker
2. ILOVEYOU
3. MyDoom
4. Storm Worm
5. Sasser & Netsky
6. Anna Kournikova
7. Slammer
8. Stuxnet
● CryptoLocker - Released in September 2013, CryptoLocker spread through email attachments and
encrypted the user’s files so that they couldn’t access them. The hackers then sent a decryption key in
return for a sum of money, usually somewhere from a few hundred pounds up to a couple of grand.
Cost of the malware: With 500,000 victims, CryptoLocker made upwards of $30 million in 100 days.
● ILOVEYOU - It’s been 15 years since ILOVEYOU was let loose on the internet. By today’s standards
it’s a pretty tame virus, but in 2000 it was the most damaging malware event of all time. Likely,
ILOVEYOU inspired many hackers to wield their keyboard as a weapon. The malware was a worm that
was downloaded by clicking on an attachment called ‘LOVE-LETTER-FOR-YOU.TXT.vbs’. Cost of the
malware: $15 billion.
● MyDoom - MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based
worm ever. MyDoom was an odd one, as it hit tech companies like SCO, Microsoft, and Google with a
Distributed Denial of Service attack. 25% of infected hosts of the .A version of the virus allegedly hit
the SCO website with a boatload of traffic in an attempt to crash its servers. Cost of the malware: $38
billion.
● Storm Worm - Storm Worm was a particularly vicious virus that made the rounds in 2006 with a
subject line of ‘230 dead as storm batters Europe’. Intrigued, people would open the email and click on
a link to the news story and that’s when the problems started. By July 2007, Storm Worm was picked
up in more than 200 million emails. Cost of the malware: An exact cost is yet to be calculated.
● Sasser & Netsky - 17-year-old Sven Jaschan created Sasser & Netsky, two worms, in the early
noughties. Sasser & Netsky are actually two separate worms, but they’re often grouped together
because the similarities in the code led experts to believe they were created by the same person.
Sasser spread through infected computers by scanning random IP addresses and instructing them
to download the virus. Netsky was the more familiar email-based worm. Netsky was actually the
more viral virus, and caused a huge amount of problems in 2004. Cost of malware: Around $31 billion.
● Anna Kournikova - Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject
was “Here you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs. Anna was pretty
harmless and didn’t do much actual damage, though De Wit turned himself into police anyway. Cost of
the malware: $166,000.
● Slammer - While most of the malware on this list strictly hit computers, Slammer was created with
broader ambitions. Slammer is the kind of virus that makes it into films, as only a few minutes after
infecting its first victim, it was doubling itself every few seconds. 15 minutes in and Slammer had
infected half of the servers that essentially ran the internet. The Bank of America’s ATM service
crashed, 911 services went down, and flights had to be cancelled because of online errors. Slammer,
quite aptly, caused a huge panic as it had effectively managed to crash the internet in 15 quick
minutes. Cost of the malware: Around $1 billion.
● Stuxnet - Stuxnet is easily the scariest virus on the list as it was built by government engineers in
the US with the intention of obstructing nukes from being built in Iran. Stuxnet spread by a USB thumb
drive and targeted software controlling a facility in Iran that held uranium. The virus was so effective it
caused their centrifuges to self-destruct, setting Iran’s nuclear development back and costing a lot of
money. Cost of the malware: Unknown.
WORM
5 Examples of Worm:
1. Internet Worms
2. Email Worms
3. Instant Messaging
Worms
4. File-Sharing Worms
5. IRC Worms
● Internet Worms - Like they do with computer networks, computer worms also target popular
websites with insufficient security. When they manage to infect the site, internet worms can replicate
themselves onto any computer being used to access the website in question. From there, internet
worms are distributed to other connected computers through the internet and local area network
connections.
● Email Worms - Email worms are most often distributed via compromised email attachments. They
usually have double extensions (for example, .mp4.exe or .avi.exe) so that the recipient would think
that they are media files and not malicious computer programs. When the victims click on the
attachment, copies of the same infected file will automatically be sent to addresses from their contacts
list.
● Instant Messaging Worms - Instant messaging worms are exactly the same as email worms,
the only difference being their method of distribution. Once again, they are masked as attachments or
clickable links to websites. They are often accompanied by short messages like “LOL” or “You have to
see this!” to trick the victim into thinking that their friend is sending them a funny video to look at.
● File-Sharing Worms - Although illegal, file-sharing and peer-to-peer file transfers are still used
by millions of people around the world. Doing so, they are unknowingly exposing their computers to the
threat of file-sharing worms. Like email and instant messaging worms, these programs are disguised as
media files with dual extensions.
● IRC Worms - Internet Relay Chat (IRC) is a messaging app that is mostly outdated nowadays but
was all the rage at the turn of the century. Same as with today’s instant messaging platforms,
computer worms were distributed via messages containing links and attachments. The latter was less
effective due to an extra layer of protection that prompted users to accept incoming files before any
transfer could take place.
TROJAN HORSE
5 Types of Trojan
Horse:
1. Backdoor Trojans
2. Downloader Trojans
3. Distributed Denial-of-
Service Trojans
4. Banking Trojans
5. Fake Antivirus Trojans
● Backdoor Trojans - As the name suggests, these types of Trojan horses have a backdoor of sorts,
a secret passage through which hackers can access your computer and take control of it. Depending on
how sophisticated they are, backdoor Trojans can be used to monitor your web traffic and online
activity, run and/or terminate tasks and processes, upload files without your knowledge, and change
your computer settings.
● Downloader Trojans - Downloader Trojans don’t have a backdoor component that would allow
hackers direct access to your computer, but they still perform actions on your computer that could
benefit the hacker. Namely, these Trojan horses are programmed to download a variety of files and
programs to your hard drive. These can include misleading apps, configuration settings, and upgrades
to the malware that’s installed on your PC.
● Distributed Denial-of-Service Trojans - Distributed Denial-of-Service (DDoS) Trojans are
types of malware designed to carry out attacks against computer networks. They are usually
downloaded and installed on numerous computers at once via spam mail campaigns, turning those
machines into parts of a botnet. These Trojans have a backdoor component, which allows hackers to
activate their botnet army to perform coordinated attacks.
● Banking Trojans - With the growing popularity of online banking services, banking Trojans have
become more common than ever. In the first six months of 2018, these Trojan horses have overtaken
ransomware as the most widespread form of malicious software. As their name suggests, these
Trojans are designed to steal the victims’ financial information and online banking credentials through
the use of phishing techniques.
● Fake Antivirus Trojans - Although they have been around for well over a decade, fake antivirus
Trojans are still very common and powerful. They are downloaded the same way as all other Trojans –
via compromised email attachments, suspicious links, and visits to malicious websites. Once installed,
they masquerade as antivirus software and constantly inform the victim about non-existent security
threats found on their computer.
Known as antivirus software, is software designed to detect, disable, and remove
viruses, worms, and Trojans before they infect a computer. Commonly used antivirus are
Norton, Kaspersky, Eset, Mcafee, Trend Micro, Avast, Avira, AVG and SmadAV.
SmadAV antivirus is used in TESDA Assessment for Computer Systems Servicing
NC II. It is a lightweight antivirus software which provides decent protection form all kind of
nasty viruses. This antivirus software is based on Indonesia but became so popular
worldwide because you can use it with any other antivirus software to make an extra layer
of protection.
It has the following key features:
● Works with any other antivirus software like AVG, AVAST, Panda etc.
● Very light weight and takes low resource to run
● Best USB protection to stop spreading virus through USB flush drive
● Cleans infected computer and fix the registry changed by the viruses
● Adds new viruses in the SmadAV database regularly and keep protected
● Updates automatically with the new versions of SmadAV (Pro-version)
VIRUS PROTECTION SOFTWARE
How to download and Install?
● Step 1. Access http://www.smadav.net/ website and click on Free Download
● Step 2. Wait till save as window appears. Save the file on the Desktop
● Step 3. Double click on the file from the desktop
● Step 4. Click OK with language selection (English)
SmadAV
SmadAV
● Step 5. Click Next on the Welcome Wizard ● Step 6. Accept the license agreement and click
Next
SmadAV
● Step 7. Click Next with Desktop shortcut option ● Step 8. Click Install
SmadAV
● Step 9. Click Launch and Finish
Activity 1:
Direction. Identify the following statement. Select your answer from the box
below. Write your answer on the space provided before each number. Answers can be
selected more than once.
___________________1. Jayson creates a fake bank website and published it to the internet.
___________________2. Events or attacks that steal, damage, or destroy such equipment
as servers, switches, and wiring.
___________________3. It is a self-replicating program that is harmful to networks.
___________________4. Onel De Guzman created the I love You Virus that can slow down
computers and corrupt files.
___________________5. Kevin is angry on his manager. As revenge, he inflicted virus on his
manager’s computer.
ACTIVITIES
___________________6. Anonymous Philippines vandalizes the Comelec’s Website.
___________________7. Uses code to access operating systems and software.
___________________8. Employees who have access to data, equipment, and the network.
___________________9. Users outside an organization who do not have authorized access
to the network or resources.
___________________10. It is hidden in software that appears to do one thing, and yet
behind the scenes it does another.
___________________11.It is attached to small pieces of computer code, software, or
document.
ACTIVITIES
Activity 2.
Sequencing: Rearrange the SMADAV installation steps. Use small letter to indicate
their order of precedence.
_______1. Double click on the file from the desktop
_______2. Click Launch and Finish
_______3. Access http://www.smadav.net/ website and click on Free Download
_______4. Click OK with language selection
_______5. Accept the license agreement and click Next
_______6. Wait till save as window appears. Save the file on the Desktop
_______7. Click Install
_______8. Click Next with Desktop shortcut option
_______9. Click Next on the Welcome Wizard
ACTIVITIES
Activity 1: Activity 2:
1. Data 1. c
2. Physical 2. h
3. Worm 3. a
4. Physical/Data 4. d
5. Malicious Threat 5. e
6. Unstructured Attack 6. b
7. Structured Attack 7. g
8. Internal 8. f
9. External 9. e
10. Trojan Horse
11. Virus
Answer Key:
Network Security.pptx

More Related Content

Similar to Network Security.pptx

Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
Avinash627658
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
karthikvcyber
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
visik2
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
faadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
HArshMangasuli
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
HeroZero12
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
mohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
ssuser77bda9
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
VarunJain65422
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
KeerthikaaThiyagaraj
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
JacobJose37
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
SASASASA93
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
BUSHRASHAIKH804312
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
1A245MohitTitarmare
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
ECoyShastriBhawan
 

Similar to Network Security.pptx (20)

Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
 

More from EdwinGervacio2

CLASSROOM ORIENTATION and CLASSROOM RULES.pptx
CLASSROOM ORIENTATION and CLASSROOM RULES.pptxCLASSROOM ORIENTATION and CLASSROOM RULES.pptx
CLASSROOM ORIENTATION and CLASSROOM RULES.pptx
EdwinGervacio2
 
New-TIP-Course-6-DepEd-Teacher for .pptx
New-TIP-Course-6-DepEd-Teacher for .pptxNew-TIP-Course-6-DepEd-Teacher for .pptx
New-TIP-Course-6-DepEd-Teacher for .pptx
EdwinGervacio2
 
Abena john dave.pptx
Abena john dave.pptxAbena john dave.pptx
Abena john dave.pptx
EdwinGervacio2
 
Quiz (Grade 11 ICT).pptx
Quiz (Grade 11 ICT).pptxQuiz (Grade 11 ICT).pptx
Quiz (Grade 11 ICT).pptx
EdwinGervacio2
 
operating system.pptx
operating system.pptxoperating system.pptx
operating system.pptx
EdwinGervacio2
 
workimmersion-171116014048.pptx
workimmersion-171116014048.pptxworkimmersion-171116014048.pptx
workimmersion-171116014048.pptx
EdwinGervacio2
 
MTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptxMTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptx
EdwinGervacio2
 
DLL_ESP 5_Q3_W4.pptx
DLL_ESP 5_Q3_W4.pptxDLL_ESP 5_Q3_W4.pptx
DLL_ESP 5_Q3_W4.pptx
EdwinGervacio2
 
DLL_ARALING PANLIPUNAN 5_Q3_W4.ppt
DLL_ARALING PANLIPUNAN 5_Q3_W4.pptDLL_ARALING PANLIPUNAN 5_Q3_W4.ppt
DLL_ARALING PANLIPUNAN 5_Q3_W4.ppt
EdwinGervacio2
 
ARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptx
ARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptxARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptx
ARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptx
EdwinGervacio2
 
us-national-technology-day.pptx
us-national-technology-day.pptxus-national-technology-day.pptx
us-national-technology-day.pptx
EdwinGervacio2
 
Mapeh week 2.pptx
Mapeh week 2.pptxMapeh week 2.pptx
Mapeh week 2.pptx
EdwinGervacio2
 
CONSERVE ESTUARY.pptx
CONSERVE ESTUARY.pptxCONSERVE ESTUARY.pptx
CONSERVE ESTUARY.pptx
EdwinGervacio2
 
workimmersionorientation-221109102006-4c53be25.pptx
workimmersionorientation-221109102006-4c53be25.pptxworkimmersionorientation-221109102006-4c53be25.pptx
workimmersionorientation-221109102006-4c53be25.pptx
EdwinGervacio2
 
Configuring Wireless Network Connection.pptx
Configuring Wireless Network Connection.pptxConfiguring Wireless Network Connection.pptx
Configuring Wireless Network Connection.pptx
EdwinGervacio2
 
Denotative and Connotation.pptx
Denotative and Connotation.pptxDenotative and Connotation.pptx
Denotative and Connotation.pptx
EdwinGervacio2
 

More from EdwinGervacio2 (17)

CLASSROOM ORIENTATION and CLASSROOM RULES.pptx
CLASSROOM ORIENTATION and CLASSROOM RULES.pptxCLASSROOM ORIENTATION and CLASSROOM RULES.pptx
CLASSROOM ORIENTATION and CLASSROOM RULES.pptx
 
New-TIP-Course-6-DepEd-Teacher for .pptx
New-TIP-Course-6-DepEd-Teacher for .pptxNew-TIP-Course-6-DepEd-Teacher for .pptx
New-TIP-Course-6-DepEd-Teacher for .pptx
 
Abena john dave.pptx
Abena john dave.pptxAbena john dave.pptx
Abena john dave.pptx
 
Quiz (Grade 11 ICT).pptx
Quiz (Grade 11 ICT).pptxQuiz (Grade 11 ICT).pptx
Quiz (Grade 11 ICT).pptx
 
operating system.pptx
operating system.pptxoperating system.pptx
operating system.pptx
 
workimmersion-171116014048.pptx
workimmersion-171116014048.pptxworkimmersion-171116014048.pptx
workimmersion-171116014048.pptx
 
MTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptxMTECH-REPORT GROUP 1 STEM COURTESY.pptx
MTECH-REPORT GROUP 1 STEM COURTESY.pptx
 
DLL_ESP 5_Q3_W4.pptx
DLL_ESP 5_Q3_W4.pptxDLL_ESP 5_Q3_W4.pptx
DLL_ESP 5_Q3_W4.pptx
 
DLL_ARALING PANLIPUNAN 5_Q3_W4.ppt
DLL_ARALING PANLIPUNAN 5_Q3_W4.pptDLL_ARALING PANLIPUNAN 5_Q3_W4.ppt
DLL_ARALING PANLIPUNAN 5_Q3_W4.ppt
 
ARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptx
ARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptxARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptx
ARSantalisis-LDM2-For-teachers-Practicum-Portfolio.pptx
 
us-national-technology-day.pptx
us-national-technology-day.pptxus-national-technology-day.pptx
us-national-technology-day.pptx
 
Mapeh week 2.pptx
Mapeh week 2.pptxMapeh week 2.pptx
Mapeh week 2.pptx
 
CONSERVE ESTUARY.pptx
CONSERVE ESTUARY.pptxCONSERVE ESTUARY.pptx
CONSERVE ESTUARY.pptx
 
workimmersionorientation-221109102006-4c53be25.pptx
workimmersionorientation-221109102006-4c53be25.pptxworkimmersionorientation-221109102006-4c53be25.pptx
workimmersionorientation-221109102006-4c53be25.pptx
 
Configuring Wireless Network Connection.pptx
Configuring Wireless Network Connection.pptxConfiguring Wireless Network Connection.pptx
Configuring Wireless Network Connection.pptx
 
Denotative and Connotation.pptx
Denotative and Connotation.pptxDenotative and Connotation.pptx
Denotative and Connotation.pptx
 
TASK.docx
TASK.docxTASK.docx
TASK.docx
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Network Security.pptx

  • 2. Network Security protects your network and data from breaches, intrusions and other threats. ... Network Security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more. INTRODUCTION
  • 3. Computer and network security help keep data and equipment safe by giving only the appropriate people access. Everyone in an organization should give high priority to security, because everyone can be affected by a lapse in security. Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be harmed. A technician’s primary responsibilities include data and network security. You may have to repair, adjust, and install equipment. You need to know how to configure settings to keep the network secure, but still keep it available to those who need to access it. You will ensure that software patches and updates are applied, antivirus software is installed, and antispyware software is used. You may also be asked to instruct users on how to maintain good security practices with computer equipment. BACKGROUND INFORMATION FOR LEARNERS
  • 4. ● Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring. ● Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information. SECURITY ATTACKS
  • 7. Threats to security can come from inside or outside an organization, and the level of potential damage can vary greatly. Potential threats include the following: Internal: Employees who have access to data, equipment, and the network. Internal attacks can be characterized as follows: ❖ Malicious threats are when an employee intends to cause damage. ❖ Accidental threats are when the user damages data or equipment unintentionally. External: Users outside an organization who do not have authorized access to the network or resources. External attacks can be characterized as follows: ❖ Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize. ❖ Structured attacks, which use code to access operating systems and software.
  • 11. ● Virus is attached to small pieces of computer code, software, or document. The virus executes when the software runs on a computer. ● Worm is a self-replicating program that is harmful to networks. A worm uses the network to duplicate its code to the hosts on a network, often without any user intervention. ● Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another. TYPES OF MALWARE
  • 12. VIRUS 8 Examples of Computer Virus: 1. CryptoLocker 2. ILOVEYOU 3. MyDoom 4. Storm Worm 5. Sasser & Netsky 6. Anna Kournikova 7. Slammer 8. Stuxnet
  • 13. ● CryptoLocker - Released in September 2013, CryptoLocker spread through email attachments and encrypted the user’s files so that they couldn’t access them. The hackers then sent a decryption key in return for a sum of money, usually somewhere from a few hundred pounds up to a couple of grand. Cost of the malware: With 500,000 victims, CryptoLocker made upwards of $30 million in 100 days. ● ILOVEYOU - It’s been 15 years since ILOVEYOU was let loose on the internet. By today’s standards it’s a pretty tame virus, but in 2000 it was the most damaging malware event of all time. Likely, ILOVEYOU inspired many hackers to wield their keyboard as a weapon. The malware was a worm that was downloaded by clicking on an attachment called ‘LOVE-LETTER-FOR-YOU.TXT.vbs’. Cost of the malware: $15 billion. ● MyDoom - MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based worm ever. MyDoom was an odd one, as it hit tech companies like SCO, Microsoft, and Google with a Distributed Denial of Service attack. 25% of infected hosts of the .A version of the virus allegedly hit the SCO website with a boatload of traffic in an attempt to crash its servers. Cost of the malware: $38 billion.
  • 14. ● Storm Worm - Storm Worm was a particularly vicious virus that made the rounds in 2006 with a subject line of ‘230 dead as storm batters Europe’. Intrigued, people would open the email and click on a link to the news story and that’s when the problems started. By July 2007, Storm Worm was picked up in more than 200 million emails. Cost of the malware: An exact cost is yet to be calculated. ● Sasser & Netsky - 17-year-old Sven Jaschan created Sasser & Netsky, two worms, in the early noughties. Sasser & Netsky are actually two separate worms, but they’re often grouped together because the similarities in the code led experts to believe they were created by the same person. Sasser spread through infected computers by scanning random IP addresses and instructing them to download the virus. Netsky was the more familiar email-based worm. Netsky was actually the more viral virus, and caused a huge amount of problems in 2004. Cost of malware: Around $31 billion. ● Anna Kournikova - Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject was “Here you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs. Anna was pretty harmless and didn’t do much actual damage, though De Wit turned himself into police anyway. Cost of the malware: $166,000.
  • 15. ● Slammer - While most of the malware on this list strictly hit computers, Slammer was created with broader ambitions. Slammer is the kind of virus that makes it into films, as only a few minutes after infecting its first victim, it was doubling itself every few seconds. 15 minutes in and Slammer had infected half of the servers that essentially ran the internet. The Bank of America’s ATM service crashed, 911 services went down, and flights had to be cancelled because of online errors. Slammer, quite aptly, caused a huge panic as it had effectively managed to crash the internet in 15 quick minutes. Cost of the malware: Around $1 billion. ● Stuxnet - Stuxnet is easily the scariest virus on the list as it was built by government engineers in the US with the intention of obstructing nukes from being built in Iran. Stuxnet spread by a USB thumb drive and targeted software controlling a facility in Iran that held uranium. The virus was so effective it caused their centrifuges to self-destruct, setting Iran’s nuclear development back and costing a lot of money. Cost of the malware: Unknown.
  • 16. WORM 5 Examples of Worm: 1. Internet Worms 2. Email Worms 3. Instant Messaging Worms 4. File-Sharing Worms 5. IRC Worms
  • 17. ● Internet Worms - Like they do with computer networks, computer worms also target popular websites with insufficient security. When they manage to infect the site, internet worms can replicate themselves onto any computer being used to access the website in question. From there, internet worms are distributed to other connected computers through the internet and local area network connections. ● Email Worms - Email worms are most often distributed via compromised email attachments. They usually have double extensions (for example, .mp4.exe or .avi.exe) so that the recipient would think that they are media files and not malicious computer programs. When the victims click on the attachment, copies of the same infected file will automatically be sent to addresses from their contacts list. ● Instant Messaging Worms - Instant messaging worms are exactly the same as email worms, the only difference being their method of distribution. Once again, they are masked as attachments or clickable links to websites. They are often accompanied by short messages like “LOL” or “You have to see this!” to trick the victim into thinking that their friend is sending them a funny video to look at.
  • 18. ● File-Sharing Worms - Although illegal, file-sharing and peer-to-peer file transfers are still used by millions of people around the world. Doing so, they are unknowingly exposing their computers to the threat of file-sharing worms. Like email and instant messaging worms, these programs are disguised as media files with dual extensions. ● IRC Worms - Internet Relay Chat (IRC) is a messaging app that is mostly outdated nowadays but was all the rage at the turn of the century. Same as with today’s instant messaging platforms, computer worms were distributed via messages containing links and attachments. The latter was less effective due to an extra layer of protection that prompted users to accept incoming files before any transfer could take place.
  • 19. TROJAN HORSE 5 Types of Trojan Horse: 1. Backdoor Trojans 2. Downloader Trojans 3. Distributed Denial-of- Service Trojans 4. Banking Trojans 5. Fake Antivirus Trojans
  • 20. ● Backdoor Trojans - As the name suggests, these types of Trojan horses have a backdoor of sorts, a secret passage through which hackers can access your computer and take control of it. Depending on how sophisticated they are, backdoor Trojans can be used to monitor your web traffic and online activity, run and/or terminate tasks and processes, upload files without your knowledge, and change your computer settings. ● Downloader Trojans - Downloader Trojans don’t have a backdoor component that would allow hackers direct access to your computer, but they still perform actions on your computer that could benefit the hacker. Namely, these Trojan horses are programmed to download a variety of files and programs to your hard drive. These can include misleading apps, configuration settings, and upgrades to the malware that’s installed on your PC. ● Distributed Denial-of-Service Trojans - Distributed Denial-of-Service (DDoS) Trojans are types of malware designed to carry out attacks against computer networks. They are usually downloaded and installed on numerous computers at once via spam mail campaigns, turning those machines into parts of a botnet. These Trojans have a backdoor component, which allows hackers to activate their botnet army to perform coordinated attacks.
  • 21. ● Banking Trojans - With the growing popularity of online banking services, banking Trojans have become more common than ever. In the first six months of 2018, these Trojan horses have overtaken ransomware as the most widespread form of malicious software. As their name suggests, these Trojans are designed to steal the victims’ financial information and online banking credentials through the use of phishing techniques. ● Fake Antivirus Trojans - Although they have been around for well over a decade, fake antivirus Trojans are still very common and powerful. They are downloaded the same way as all other Trojans – via compromised email attachments, suspicious links, and visits to malicious websites. Once installed, they masquerade as antivirus software and constantly inform the victim about non-existent security threats found on their computer.
  • 22. Known as antivirus software, is software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. Commonly used antivirus are Norton, Kaspersky, Eset, Mcafee, Trend Micro, Avast, Avira, AVG and SmadAV. SmadAV antivirus is used in TESDA Assessment for Computer Systems Servicing NC II. It is a lightweight antivirus software which provides decent protection form all kind of nasty viruses. This antivirus software is based on Indonesia but became so popular worldwide because you can use it with any other antivirus software to make an extra layer of protection. It has the following key features: ● Works with any other antivirus software like AVG, AVAST, Panda etc. ● Very light weight and takes low resource to run ● Best USB protection to stop spreading virus through USB flush drive ● Cleans infected computer and fix the registry changed by the viruses ● Adds new viruses in the SmadAV database regularly and keep protected ● Updates automatically with the new versions of SmadAV (Pro-version) VIRUS PROTECTION SOFTWARE
  • 23. How to download and Install? ● Step 1. Access http://www.smadav.net/ website and click on Free Download ● Step 2. Wait till save as window appears. Save the file on the Desktop ● Step 3. Double click on the file from the desktop ● Step 4. Click OK with language selection (English) SmadAV
  • 24. SmadAV ● Step 5. Click Next on the Welcome Wizard ● Step 6. Accept the license agreement and click Next
  • 25. SmadAV ● Step 7. Click Next with Desktop shortcut option ● Step 8. Click Install
  • 26. SmadAV ● Step 9. Click Launch and Finish
  • 27. Activity 1: Direction. Identify the following statement. Select your answer from the box below. Write your answer on the space provided before each number. Answers can be selected more than once. ___________________1. Jayson creates a fake bank website and published it to the internet. ___________________2. Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring. ___________________3. It is a self-replicating program that is harmful to networks. ___________________4. Onel De Guzman created the I love You Virus that can slow down computers and corrupt files. ___________________5. Kevin is angry on his manager. As revenge, he inflicted virus on his manager’s computer. ACTIVITIES
  • 28. ___________________6. Anonymous Philippines vandalizes the Comelec’s Website. ___________________7. Uses code to access operating systems and software. ___________________8. Employees who have access to data, equipment, and the network. ___________________9. Users outside an organization who do not have authorized access to the network or resources. ___________________10. It is hidden in software that appears to do one thing, and yet behind the scenes it does another. ___________________11.It is attached to small pieces of computer code, software, or document. ACTIVITIES
  • 29. Activity 2. Sequencing: Rearrange the SMADAV installation steps. Use small letter to indicate their order of precedence. _______1. Double click on the file from the desktop _______2. Click Launch and Finish _______3. Access http://www.smadav.net/ website and click on Free Download _______4. Click OK with language selection _______5. Accept the license agreement and click Next _______6. Wait till save as window appears. Save the file on the Desktop _______7. Click Install _______8. Click Next with Desktop shortcut option _______9. Click Next on the Welcome Wizard ACTIVITIES
  • 30. Activity 1: Activity 2: 1. Data 1. c 2. Physical 2. h 3. Worm 3. a 4. Physical/Data 4. d 5. Malicious Threat 5. e 6. Unstructured Attack 6. b 7. Structured Attack 7. g 8. Internal 8. f 9. External 9. e 10. Trojan Horse 11. Virus Answer Key: