Question

In: Computer Science

Discuss any (5) threats faced by computer network users and what strategies might be used to...

Discuss any (5) threats faced by computer network users and what strategies might be used to prevent each of them from happening .

the instructions of that question are
1- 1000 word or above
2- set refrences
(book,www,journal artical from the full-text databases, current affairs magazine , newspaper )

Solutions

Expert Solution

Threats of computer network users are:-

1).Computer virus :-

For everyday Internet users, computer viruses are one of the most common threats to cybersecurity. Statistics show that approximately 33% of household computers are affected with some type of malware, more than half of which are viruses.

Computer viruses are pieces of software that are designed to be spread from one computer to another. They’re often sent as email attachments or downloaded from specific websites with the intent to infect your computer — and other computers on your contact list — by using systems on your network. Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer including personal information such as passwords, even going as far as to delete everything on your hard drive.

Prevention:-
1. Install an anti virus, Anti Spyware and anti malware programs.
2. Avoid suspicious websites and never open email attachments without screening them
3.A firewall is a program that screens incoming internet and network traffic. Along with your virus program, it can help prevent unauthorized access to your computer.

2). Trojan horse :-

a “Trojan horse” refers to tricking someone into inviting an attacker into a securely protected area. In computing, it holds a very similar meaning — a Trojan horse, or “Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly, by hiding behind a legitimate program.

They spread often by email; it may appear as an email from someone you know, and when you click on the email and its included attachment, you’ve immediately downloaded malware to your computer. Trojans also spread when you click on a false advertisement.

Once inside your computer, a Trojan horse can record your passwords by logging keystrokes, hijacking your webcam, and stealing any sensitive data you may have on your computer.

Prevention:-
1. Trojan Horses are often sent via email attachments in spam emails. By downloading the file, you actively infect yourself. Avoid opening any emails from people you don’t know.

2.Fake software is another common transmitter. The victim will choose to install a program, without realizing it’s transporting a Trojan. Only download well-reviewed apps and files from trusted sources to avoid this issue.
3.You don’t always have to download a Trojan virus actively. Simply visiting an infected website is enough to transfer the infection. Avoid clicking through banner ads and visiting random sites to reduce the risk.
4.Freeware is no-cost software that is easy to download. While these free programs are convenient, Trojan horses are known to piggyback on them. Do some independent research and read reviews on any free program you’re thinking about installing before downloading them.

3). DOS AND DDOS ATTACK :-

A DoS attack is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. Fortunately, you can’t really overload a server with a single other server or a PC anymore. In the past years it hasn’t been that common if anything, then by flaws in the protocol.

A DDoS attack, or distributed denial-of-service attack, is similar to DoS, but is more forceful. It’s harder to overcome a DDoS attack. It’s launched from several computers, and the number of computers involved can range from just a couple of them to thousands or even more.

Since it’s likely that not all of those machines belong to the attacker, they are compromised and added to the attacker’s network by malware. These computers can be distributed around the entire globe, and that network of compromised computers is called botnet.

Since the attack comes from so many different IP addresses simultaneously, a DDoS attack is much more difficult for the victim to locate and defend against.

PREVENTION :-

1. Buy more bandwidth  

2. Build redundancy into your infrastructure

3. Configure your network hardware against DDOS attacks

4. Deploy anti- DDOS hardware and software modules

5. Deploy a DDos protection appliance

6. Protect your DNS servers

4).Phishing

Phishing is a method of a social engineering with the goal of obtaining sensitive data such as passwords, usernames, credit card numbers.

The attacks often come in the form of instant messages or phishing emails designed to appear legitimate. The recipient of the email is then tricked into opening a malicious link, which leads to the installation of malware on the recipient’s computer. It can also obtain personal information by sending an email that appears to be sent from a bank, asking to verify your identity by giving away your private information.

PREVENTION:-

1. Keep informed about phising techniques

2. Clicking on links that appear in random emails and instant messages try to avoid it if something went wrong

5). ROOTKIT :-

Currency is called parent class while Rupee is a child of Currency class. In object oriented programming term, Currency is super class while Rupee is a subclass. It means Rupee inherits all non-private members e.g. fields and methods

PREVENTION:-

1. Avoid opening suspicious emails

2. Avoid downloading cracked software

3.through system vulnerabilities a rootkit can get through to your computer system which be deal by installing software updates


Related Solutions

Discuss any (5) threats faced by computer network users and what strategies might be used to...
Discuss any (5) threats faced by computer network users and what strategies might be used to prevent each of them from happening. the instructions of that question are 1- 1000 word or above 2- set references (book, www, journal article from the full-text databases, current affairs magazine, newspaper ) please with the references
List and briefly discuss five threats to a computer network
List and briefly discuss five threats to a computer network
The largest benefit to a computer network is the ability to share information. Threats to health...
The largest benefit to a computer network is the ability to share information. Threats to health care networks are becoming prominently prevalent. You are working as a nurse educator in a large hospital system. Nurse educators have been centralized however; are required to travel to the organizations regional facilities. Educators use their smartphones and i-Pads to interact and share data and information. What are the first steps you would take to secure these exchanges? Describe why each step is important....
Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal...
Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal action perpetrated primarily through the use of a computer. 1. Using search engine on the Internet, find a current article (one written within the last 3 years) about a computer hacker or a computer virus. Give the site address, and the article title and author and date. 2. Write at least 5 sentences summarizing the article making sure to list any details about the...
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide...
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide your clear justification on the benefits. (400 WORDS)
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide...
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide your clear justification on the benefits.
Wireless Medical Sensor Network (WMSN) What a computer network is and what is the importance of...
Wireless Medical Sensor Network (WMSN) What a computer network is and what is the importance of the computer network to this topic (Wireless Medical Sensor Network)?.   Explain how a Wireless Medical Sensor Network (WMSN) differs from a Wireless Sensor Network (WSN). What kind of devices does it consist of? What kind of data do the devices collect? Please include information about authentication, user friendliness and user anonymity.
1. Why is it important for mobile workers and users to know what the risks, threats,...
1. Why is it important for mobile workers and users to know what the risks, threats, and vulnerabilities are when conducting remote access through the public Internet? 2. Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet? 3. Why is a remote access policy definition a best practice for handling remote employees and authorized users who require remote access from home or on business trips?...
Discuss in your own words the primary users of healthcare statistics and what they are used...
Discuss in your own words the primary users of healthcare statistics and what they are used for. Do you think there are too many statistics? Are they useful or are they a waste? As a health information professional, how can healthcare statistics be beneficial to you and provide an example.
discuss the possible threats of changing positioning strategies of the same brand to its target market....
discuss the possible threats of changing positioning strategies of the same brand to its target market. support your answer with examples
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT