Sei sulla pagina 1di 8

UNIVERSITI TEKNOLOGI MARA

CSC134 COMPUTER AND INFORMATION PROCESSING

ASSIGNMENT 3

PREPARED BY:
NAME
STUDENT
ID
GROUP

NUR SYAHMINA BT.


REDUAN

: 2013699644
: AS1204A

PREPARED FOR:
MDM SITI NURSAJANA MALIM

SUBMISSION DATE:
21 MARCH 2015

CONTENT
INTRODUCTION

3
TYPES OF INTERNET AND NETWORK ATTACKS.
4
SIGNS OF INFECTED COMPUTER.
5
HOW VIRUS CAN SPREAD THROUGH AN E-MAIL
MESSAGE.

PRECAUTION STEPS TO AVOID INTERNET AND


NETWORK ATTACKS.

TYPES OF PROTECTOR SOFTWARE.


8
REFERENCES.
9

Introduction

Definition of internet:
Internet is a worldwide collection of network that connects millions of business,
government, agencies, educations, institution and individuals.

Definition of networks:
Networks are a collection of computer and devices connected together, often wirelessly
via communication devices and transmission media.

Definition of internet and network attacks:


Internet and network attacks are any attempt to destroy, expose, alter, disable, steal or
gain unauthorized access to or make unauthorized use of an asset.

Types of Internet and Networks Attacks

1. Computer virus:
Attacks a computer negatively by altering the way computer works.
2. Worm:
Copies itself repeatedly, using up resources and possibility shutting down the computer
or network.
3. Trojan Horse:
A malicious program that hides within or looks like a legitimate program.
4. Rootkit:
Program that hides in a computer and allows someone from a remote location to take
full control.
5. Botnet:
A group of compromised computers connected to a network. A compromised computer
is known as zombie
6. Denial of service attacks (DoS attacks):
Disrupt computer access to Internet services.
7. Back door:
A program or set of instructions in a program that allow users to bypass security
controls.
8. Spoofing:
A technique intruders use to make their network or Internet transmission appear
legitimate.

Signs of Infected Computer


1. Operating system runs much slower than usual.
4

2. Available space is less than usual.


3. Files become corrupted.
4. Screen displays unusual message or image.
5. Unknown programs or files mysteriously appear.
6. Programs or files do not work properly.
7. Operating system does not start up.
8. Operating system shuts down unexpectedly.
9. Existing files and programs disappear.
10. Music or unusual sounds play randomly.
11. System properties change.

How Virus Can Spread Through an E-Mail Message

Step 1:
Unscrupulous programmers create a virus program that deletes all files. They hide the
virus in a word processing document and attach the document to an e-mail messages.
Step 2:
They send the e-mail message to thousands of users around the world.
Step 3 (a):
Some users open the attachment and the computers become infected with the virus.
Step 3 (b):
Other users do not recognize the name of the sender of the e-mail message. These
users do not open the e-mail. Instead, they immediately delete the e-mail message and
continue using their computers. These users computers are not infected with the virus.

Precaution Steps to Avoid Internet and Network Attacks


1. Never start a computer with removable media inserted in the drives or plugged in the
ports, unless the media are uninfected.
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted
source.

3. Set the macro security in programs so that you can enable or disable macros. Enables
macros only if the document is from a trusted source and you are expecting it.
4. Install an antivirus program on all of your computers. Update the software and the virus
signature files regularly.
5. Scan all downloaded programs for viruses and other malware.
6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the
attachment immediately.
7. Before using any removable media, scan the media for malware. Follow this procedure
even for shrink wrapped software from majors developers. Some commercial software
has been infected and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.

Types of Protector Software


Firewall
A software that protects a networks resources from intrusion.
Intrusion Detection Software
- Analyze all network traffics
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or system
breaches.
Honeypot
A honeypot is a deception trap, designed to entice an attacker into attempting to
compromise the information systems in an organization.

References
http://honeytrap.mwcollect.org/
http://en.wikipedia.org/wiki/Attack_%28computing%29
Discovering Computer 2012: Chapter 11