This article reviews the types of security threats that threaten the security of computers and the data they contain. A technician is responsible for protecting data and computer equipment in an organization. You will learn how to work with customers to make sure the best possible security space exists.
To effectively ensure PCs and systems, an expert must comprehend the two sorts of dangers to PC security:
Physical -occurrences or assaults that take, harm, or annihilate products, or take the merchandise, for example, servers, switches, and wiring
Information – Incidents or assaults that end, degenerate, deny, permit unapproved clients access, or take data.
Computers and their contents should be protected against malware:
1• Malware is software designed to perform malicious actions. The word malware is an acronym for malicious software.
2• It is usually installed on the computer without user information. These programs open additional windows on the computer or change the configuration of the computer.
3• Malware is the ability to edit web browsers to open specific webpages that are not the desired webpage. This is known from the direction of the browser.
4• It is capable of collecting information stored on a computer without the user’s consent.
5• The first and most common type of malware is a computer virus. A virus is transmitted to other computers via email, USB drives, file transfers, and even instant messaging. The virus hides itself by attaching itself to a computer’s computer code, software, or documents. When accessing the file, the virus processes the computer and infects it.
Another type of malware is Trojan horse. A Trojan pony normally appears as though a helpful program however it has noxious code. For instance, Trojan ponies are regularly furnished with free internet games. These games are downloaded to the client’s PC yet additionally have a Trojan pony. The Trojan pony is introduced on the client’s framework while the game is playing and continues pursuing even the game is shut.
There are several types of Trojan horses described in FigureAlways use anti-virus software, anti-spyware, and adware removal tools to detect, disable, and remove malware before it infects your computer.It is important to know that these software programs are deprecated fast. Therefore, it is the technician’s responsibility to apply the most up-to-date information, patches, and virus definitions as part of a regular maintenance schedule. Many organizations implement a written security policy stating that employees are not allowed to install software that is not provided by the company.
Phishing occurs when an abusive party sends an email, makes a phone call, or sends a text intended to trick the recipient into providing personal or financial information. Phishing attacks are also used to persuade users to inadvertently install malware on their devices.
For example, a user received an email that looks like it originated from a legitimate external organization, such as a bank. An attacker may ask for verification information, such as a username, password, or PIN number to prevent a potentially dangerous event. If the user provides the required information, the phishing attack is successful.One type of phishing attack is called spare phishing.
This happens when a specific person or organization is subjected to a phishing attack.Organizations should educate their users on phishing attacks. Providing sensitive personal or financial information online is rarely required. Legal businesses will not solicit sensitive information via email. Be suspicious When in doubt, please contact mail or by phone to ensure the authenticity of the application.
Also known as junk mail, is illegal email. In most cases, spam is used as a method of advertising. However, spam can be used to send malicious links, malware, or deceptive content. The purpose is to obtain sensitive information such as social security numbers or bank account information. Most spam is transmitted over networks through multiple computers that have been infected by a virus or a bug. These compromised computers send more andmore bulk e-mails.
Spam cannot be prevented, but its effects can be minimal. For example, most ISPs filter spam before it reaches the user’s inbox. According to statistics, many antivirus and email software programs perform email filtering automatically. This means they detect spam and remove it from an email inbox.Even with the implementation of these security features, some spam can still pass through. For some general spam tips:
1• An email subject has no subject line.
2• An email is requesting an update to an account.
3• The email is full of misspelled words or strange punctuation.
4• The links in the email are long and / or confidential.
5• An email is created in disguise as a correspondence from a legitimate business.
6• Email request that you open an attachment.
Organizations must also alert employees to the dangers of opening email attachments that may contain a virus or a bug. Don’t assume that attachments to the email are secure, even when sent from trusted contacts. The sender’s computer may be infected with a virus that is trying to spread itself. Always scan email attachments before opening them.
TCP / IP attacks
To control your Internet get to, your PC utilizes the TCP/IP convention suite. Tragically, a few highlights of TCP/IP can be controlled, which brings about system chance. As appeared in Figure, TCP/IP is defenseless against the accompanying kinds of assaults.
Denial of Service (DoS) – DoS attack that generates an unusually large number of requests to network servers, such as email or web servers. The purpose of this attack is to completely overwhelm the server so that there are false requests for legitimate users to refuse service.
Distributed DoS (DDoS) – A DDoS attack is similar to a DoS attack, but used to attack many thousands of computers, sometimes thousands. Computers are first infected with DDoS malware and then become zombies, zombies an army, or botnets. After computers are infected, they remain inactive until they need to generate a DDoS attack. Zombie computers located at different geographical locations make it difficult to detect the origin of the attack.
SYN Flood – A SYN request is the initial communication that is sent to establish a TCP connection. A SYN flood attack opens the TCP port through a collision and connects the network equipment or computer with a large number of invalid SYN requests. The reason for this is to deny sessions for others.A SYN flood attack is a kind of DoS attack.
Spoofing – In a fake attack, the computer claims to be a trusted computer for accessing resources. The computer uses a fake IP or MAC address to duplicate the network’s trusted computers.
DNS Poisoning – DNS records on a system are converted into cash server signals. The user tries to access a legitimate site, but the traffic is redirected to the destination site.
Man-in-the-middle. MitM attacks can also be used to manipulate messages and transmit false information between hosts, as hosts are unaware that messages have been edited.Replay – To perform a replay attack, data is intercepted and intercepted by the attacker. These destinations are then re-run on the target computer. The destination computer handles these replay transmissions as authentic and original source-transmitted samples.The Imposter site is used to capture confidential information, such as usernames and passwords. The attacker can then retrieve data from this location.
Zero Day Attacks
A zero-day attack, sometimes called a zero-day threat, is a computer attack that attempts to exploit software vulnerabilities that are unknown or unknown by the software vendor. The term zero hour describes the moment when an exploit is detected. During the time it takes the software vendor to create and release patches, the network is at risk of these actions, as shown in the figure. Defending these high-speed attacks requires network security professionals to adopt a better idea of network architecture. It is no longer possible to intercept certain points in the network.
Social engineering is when an attacker tries to trick people into accessing devices or networks by providing them with the necessary access information. For example, in Figure , a social engineer gains employee trust and agrees to tell the employee his or her username and password information.Here are some basic precautions to help protect against social engineering:
1• Never give your login credentials (e.g., username, password, PIN)
2• Never publish reputation information in your work area.
3• Lock your computer when you leave the desk.
4• To preserve physical location, the business must: