In: Computer Science
Discuss any (5) threats faced by computer network users and what strategies might be used to prevent each of them from happening.
the instructions of that question are
1- 1000 word or above
2- set references (book, www, journal article from the full-text databases, current affairs magazine, newspaper )
please with the references
THREATS
1. TROJAN HORSE
Trojan Horse is a malware that tricks the user by inserting an attacking code secretly into any legitimate app or a software. When the user installs the app and run it, it get access to the computer. Trojan horse virus can be often enter the system when the user click on a spam mail which has a severe warning, on false advertisements or download any application from unauthroised website.
Torjan horse can access your data like passwords, sensitive data, webcam etc.
PREVENTION:
1. Avoid opening or downloading attachments from spam mail or any mail from unknown people.
2. Avoid installing fake software or software from illegal websites. Install only apps that has a good review and those are reliable.
3. Avoid clicking advertisements in the websites.
Reference:Borders, Kevin R. "Method, system and computer program product for detecting security threats in a computer network." U.S. Patent No. 8,079,080. 13 Dec. 2011.
2. COMPUTER VIRUS:
Computer virus are one of the most common threats to cybersecurity. In day to day life, most of the house hold computers would have affected with some type of malware atleast once. They often enter into the PC through email attachments, or by an unknown software installed in the system. They can affect the computer by sending spam, corrupt and steal sensitive data, or it can also delete contents in the hard drive.
PREVENTION:
1. Avoid opening suspicious spam mails and install attachments.
Avoid clicking pop up advertisements
2. Install Anti virus softwares, anti malware programs to protect
the system.
3. All the latest models of the PC has built in anti virus
protection. Make sure they are always on.
Reference: S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol.3, no. 7, pp. 229-302, 2014
3. PHISHING
By duplicating a trusted third party, Phishing gathers infomation about sensitive data such as usernames, passwords, credintials etc. It is a cyber attack where the user get tricked by beliving any mail and opening it. In the name of any bank or a note from any company name, it tries to enter the system. When user believe that the mail is originally sent by any bank and opens the malicious link, it will automatically install malware on the user's computer.
PREVENTION:
1. Avoid clicking links from spam mail. Always check the spelling of the URL before opening it
2. Always keep an eye on redirects from any website. The redirected website may contain suspicious softwares that gets automatically installed in the computer.
REFERENCES: M. Fire, R. Goldschmidt and Y. Elovici, "Online Social Networks: Threats and Solutions," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2019-2036, Fourthquarter 2014, doi: 10.1109/COMST.2014.2321628.
4. DOS AND DDOS ATTACK :
In Denial of Service attack, the attacker targets on the website. Any website or any organisation's website will be flooded with packets where the website gets more requests than usual than the server can handle. And thsu making the website to go down.
In Distributed Denial of Service, it comes from more than one source at the same time. It is generated by using thousands or more unsuspected machines. Those machines can be distributed all over the world, and are called as Botnets. The victim cannot defend against it since the attack will be coming from different IP addresses.
PREVENTION :-
1. Safeguard DNS servers. Buy more bandwidth
2. Install anti-DDOS network hardware against DDOS attacks,
3. Install DDoS protection appliance
REFERENCES: Shrivastava, Gulshan, Kavita Sharma, and Swarnlata Rai. "The detection & defense of DoS & DDos attack: a technical overview." Proceeding of ICC. Vol. 27. 2010.
5. SPYWARE
Spywares are already installed in softwares and when the user installs it, it will secretly record any computer network activity. Spyware can steal passwords, Bank pin, and other sensitive data and sent the collected data to the attacker. It can reduce the performance of the operating system. It can never be detected . The data collected through the spyware will be sold to the third parties.
PREVENTION:
1. Install only trusted softwares from trusted websites.
2. Avoid clicking pop up advertisements
3. Install Firewall
4. Avoid clicking suspicious mails and links from mail.
REFERENCE: Tasril, Virdyra & Ginting, Meiliyani & Mardiana, Mardiana & Siahaan, Andysah Putera Utama. (2017). Threats of Computer System and its Prevention. International Journal of Scientific Research in Science and Technology. 3. 448-451.