Networking 2020-21 Part 2
Networking 2020-21 Part 2
CONCEPTS INTRODUCTION
TO WEB SERVICES
E-COMMERCE
Network security is any activity designed to
protect the usability and integrity of your network
and data.
It includesnetwork
Effective both hardware and
security software access to
manages
technologies.
the network. It targets a variety of threats and
stops them from entering or spreading on your
network.
Threats to Network Security:
• Virus
• Worms
• Trojan Horse
• Spams
Are the malicious code/programs that cause
damage to data and files on a system.
Virus attach itself to program or file so that it can
spread from one computer to another leaving
infection as it travels.
Some Virus cause only annoying effects like
changing desktop icons, etc. while others can
damage your hardware, software or files.
Almost all Virus are attached to an executable
file, it means Virus cannot infect your computer
unless you run or open the program/file.
It means Computer Virus cannot spread without
a human action.
D A M A G E O R DE LE TE FILES : some virus
may delete or damage random documents or
specific file that are crucial to Operating System
and system will not be able to boot.
It may slow down your computer
INVA D E YOUR E M A I L P R O G R A M : some
forms of viruses may wreak even more havoc by
spreading themselves to the contact in your
address book
Use Anti-Virus Software: scan all your computer
for virus, disconnect infected PC from network,
notify anti- virus vendor to update its database.
Regularly update your Anti-Virus
Don’t download or open email from unknown
sender
Don’t click on link in email rather type the link
in
address bar
Disconnect the internet if you are away
Disable cookie if possible
A worm is a self-replication programs which eats
upentire
the disk space or memory. A Worm keeps on
creating its copies until all the disk space or
memory is filled.
Worms harm to a computer or a computer
network by consuming bandwidth and slow
down the network speed. After the worm has
infected a system, it can propagate to other
systems via internet or while copying files from
one system to another without user interaction
D A M AG
E • It eats up entire disk space or memory
• Consumes network bandwidth and slows
down the network speed.
PREVENTION
• Use Total Security software and scan
the PC using the option BOOT TIME
SCAN.
• Update regularly
• Avoid inserting infected pen drives
Is a program that appears harmless (such as
text editor or a utility program) but actually
performs malicious functions such as deleting
or damaging files.
With help of Trojan, harm that could be done by
hacker on target computer systems are:
• Data theft
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. And
many more…
Use Total Security
software
Update regularly
Never download any software of file from
untrusted website
While using public computer, check for any
addition device connected to it or be alert of
keylogger software, so for financial transaction
prefer to use VIRTUAL KEYBOARD rather than
keyboard typing
Logout from your account and remove history if
you are working on public computer
Means sending of bulk-mail by an identified or
unidentified source. In non-malicious form, bulk
advertising mail is sent to many accounts. In
malicious form (email bombarding) the attackers
keeps on sending bulk mail until the mail-server
Spam
runs out ofreduces productivity:
disk space. billions of spam
Damages are:
messages circulating across the Internet can disrupt
email delivery, degrade system performance and
reduce overall productivity
Spam eats up your time: deleting spam emails like
the simple solutions, but it eats a significant amount
of productivity
Spam can lead to worse things: spam messages may
contain offensive, fraudulent material and can even
be used to spread viruses.
Also known as web cookie or browser cookie, is
a small piece of data sent from a website and
stored in a user’s web browser while a user is
browsing a website. Some cookies disappear
after user closes his browser while others,
known as tracking cookies, remain saved and
load the next time user visits the same website.
Cookie help website to store information about
visitors like username, password and other
details.
Although cookie help track user’s browsing
sessions and load information faster, but create
some security and privacy concerns as well.
These security and privacy concerns are:
• Session Data: When we visit any website on
regular basis, we may not have to enter
username and password to get in. That’s
because the information is being pulled from
tracking cookie. These cookie stores
information in encrypted form but if
somebody gets the encryption key he could
discover your password
• Tracking Information: you visit
websites
when with advertisements, those ads
certain
create cookies that store and track your online
pattern. You may have noticed that if you go to
a clothing store’s website, for example you’ll
see ads for that store when you click away to
other website. That’s because tracking
cookies have relayed this information back to
advertisers, who use it to target their ads.
• Public Computers: the same general threats
exists for traffic cookies saved on public
computer. So it is advised when you finish
using public computer or shared computer,
delete the cookies to ensures that the next
people who use the same computer can’t
access the information
A firewall is a technique used in a secured
computer system or network to block
unauthorized access and allow only the
authorized user.
Firewalls can be implemented in either hardware
or software, or a combination of both. It is a
device or set of devices or software running on
a computer, which is configured to permit or
deny computer
Software firewall Hardware Firewall
Firewall softwares are It is physical piece of
frequently used to equipment designed to
prevent unauthorized perform firewall duties.
Internet users from
accessing private It may be actually be another
networks connected computer or dedicated piece
to the Internet, especially of equipment which serve as
intranets. firewall.