Maintaining the Network. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Hot and Cold Spares  Hot spare requires.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Protecting Your Computer & Your Information
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
D. Beecroft Fremont High School VIRUSES.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
CONTENTS What is Virus ? Types of computer viruses.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Viruses Author: Alyse Allen.
Chapter 40 Internet Security.
Chapter Objectives In this chapter, you will learn:
Lecture 8. Cyber Security, Ethics and Trust
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
Presentation transcript:

Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Hot and Cold Spares  Hot spare requires no technician intervention Hot spare  Cold spare requires technician to install it into the system after removing the failed component Cold spare

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Hot, Cold, and Warm Sites  Describes the readiness of an off-site data storage facility to recover from a failure at the primary site

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Electrical Surge  Can be suppressed by a lightening arrestor or an Uninterruptible Power Supply (UPS)lightening arrestor

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Electrical Spike  Can be caused by electrical equipment, such as motors, welders, and switches  The result of inductive reactance, which is associated with the coils inside some electrical equipment  Isolating the computer system electrical circuit can reduce the effects

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Brownout  Main cause is excessive consumption of electricity  Can damage electrical equipment  UPS unit could prevent its effects

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Blackout  Routinely caused by electrical system equipment failure  Can cause a loss of data  UPS unit could prevent its effects

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Uninterruptable Power Supply (UPS)  Protects against electrical surges, spikes, brownouts, and blackouts  Exact length of time UPS can supply power during a blackout depends on the:  Amount of electrical load it must support  Size or amp-hour capacity of the batteries in the UPS unit  Provides power conditioningpower conditioning

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. UPS Categories  Standby UPS—Still possibility of data corruption Standby UPS  Continuous UPS—Eliminates possibility of data corruption Continuous UPS  Isolation transformer—Normally used to raise or lower voltage levels in electrical systems Isolation transformer  A generator should be used for computer systems that require 24/7/365 uptimegenerator

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Protecting Networks from Malware  Malicious code can compromise security, damage data, and cause system failure  Best protection against malware is a combination of:  User policies  Antivirus software

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. User Policies  Outline how users are to use and not use their workstation and the network  Should be set in place and enforced  Typically called an Acceptable Use Policy

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Acceptable Use Policy  Do not open attachments from unknown sources, or with exe, com, or bat extensions  Do not download any files from unknown sources  Update antivirus software on a regular basis  Never open ads, chain letters, or junk mail  Do not click icons embedded in files or s  If you doubt authenticity, verify source first

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Antivirus Software  Used to scan files and for viruses  Should be installed on server and each workstation  Consists of a scan engine and a virus pattern filescan enginevirus pattern file  Virus pattern file should be updated on regular basis  Antivirus suite can include firewall, spam protection and popup ad blocker Antivirus suite

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Malware  Contraction of description malicious software  Unauthorized activity can be harmless or destructive  The terms malware, virus, and worm are often used interchangeably; this is not technically correct  Can be a combination of classifications

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Virus InfectionReplicationExecution Three Phases of a Virus

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Worm  Different than a virus in that it spreads to network computers from the infected computer  Is typically distributed through

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Trojan Horse  Once it is opened, the malware is activated  Can cause immediate damage or wait until preset date  Has harmless outward appearance  Can cause most anything imaginable to the computer

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. A user receives an posing to be from the IRS. Attached is a document with malicious code. When the attachment is opened, the code executes, steals banking information stored on the user’s computer, and forwards it to the malicious party. How would this type of virus be classified and why? Applied Networking

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. A user receives an posing as a Facebook notification. The prompts the user to click a URL to view the message. When the user clicks the URL, he or she is taken to a site and prompted to install a fake Facebook Messenger program. This program, if installed, allows an intruder to execute any command from the user’s computer. How would this type of virus be classified and why? Applied Networking

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Joke Program  Typically activated when the user invokes a certain action  Some jokes are not destructive, but time is needed to remove program  Examples: A dialog box indicating the hard disk drive is about to be formatted

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. MBR Virus  Plants a hexadecimal code in the master boot record, rendering the MBR useless  Results in boot failure  Many antivirus programs perform MBR backups as part of their installation

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Logic Bomb  Can be triggered by a date, time, certain number, word, file name, etc.  In waiting before delivering its payload, this malware has time to spread to other computers

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Backdoor Virus  Not designed to be directly destructive, but to breach security systems  Backdoor allows computer file system to be accessed by an intruder

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Password Virus  Steals a password and stores it on another location  Is closely associated with the backdoor virus and may be used in combination

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Stealth Virus  Signature of a stealth virus is difficult to detect  Antivirus program detects stealth virus by changes to file length

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Polymorphic Virus  Changes its characteristics to go undetected by antivirus programs  Most dangerous viruses use both polymorphic and stealth characteristics

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Hoax  Can be classified as a prank  Can cost money through loss of production  Consumes a lot of time to determine that program is harmless

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Macro Virus  Created with the macro feature of a software applicationmacro  Usually distributed as an attachment

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. System Migration  Can refer to:  Combining two diverse network systems  Converting an operating system to a newer version that uses different technologies

I N CLASS LAB Roberts Labs 84,85 N EXT C LASS LabSim homework: