Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

UNIT-2

TOPIC: NETWORK SECURITY


CONCEPTS
SECURITY THREATS
Computer Security Threats
(i) Malware

(ii) Virus

(iii) Worm

(iv) Trojan Horse

(v) Spyware

(vi) Adware
Malware
• Malware, or malicious software, is a program or file that is
harmful and intentionally designed to damage a computer
user‘s data.
• Types of malware can include computer viruses, worms,
Trojan horses and spyware etc.
Virus
It is a small piece of software that can spread from one
infected computer to another. It can corrupt or delete
data on your computer/hard drive.
Worm
A worm is a self-replicating program which eats up the
entire disk space or memory. A worm keeps on creating
its copies until the entire space of disk is filled.
Trojan Horse
It is a program that appears harmless(such as a text editor
or a utility program) but actually performs malicious
functions such as deleting or damaging files.
Spyware
• Spyware is software which is installed on your computer
to spy on your activities and report this data to people
willing to pay for it.
• It tracks the user’s behavior and reports information back
to the central source.
• Spyware mostly gets installed on your PC without your
consent.
Adware
• These are the programs that deliver unwanted ads to your
computer generally in form of Pop-Ups. They consume
your internet bandwidth.

• Adware is similar to Spyware but it may be installed with


your consent. So it is advised that you thoroughly read
the installation agreement before you allow installation of
any software.
PREVENTIONS FROM THREATS
Firewall
• A system designed to prevent unauthorized access to or
from a private network is called Firewall.

• Firewall is a mechanism to prevent unauthorized Internet


users from accessing private networks connected to the
Internet especially intranet.
http OR https

 Always check the website URL starts with https:// The website
URL with https encrypts your data in the website and protects it
from any kind of tampering.
 HTTP and HTTPs both are used for transferring data between the
client browser (request) and the web server (response), but in
case of HTTPs the transferring of data is done in an encrypted
format.
 It is often used to protect highly confidential online transaction
like online banking or online shopping etc.
Safety Tips for better Security
• Install Firewall.

• Install Antivirus Software.

• Install Anti-Spyware Software.

• Use Complex and Secure Passwords.

• Check the Security Settings of the Browser.


Cookies
• Cookies are small piece of information website can store in
your browser. For example: when you sign into your online
banking website, a cookie remembers your login information.
Cookies can be of two types:
• First Party Cookies: These are the cookies that stores your
own login id, passwords, auto fill information etc.

• Third Party Cookies: These are the cookies that websites


store to know about your search history and web browsing
history so as to place advertisement as per your interest.
Thank You

You might also like