2. What is computer virus?
- Attached to a small pieces of computer
code, software, or documents.
- A virus executes when the software is
run on a computer. If the virus spreads
to other computers. Those computers
could continue to spread the virus.
- A virus is transferred to another
through e-mail, file transfers, and
instant messaging.
- A virus has a potential to corrupt or even delete files on your computer, use e-mail to
spread itself to other computers, or even erase your hard drive.
3. What is Worm?
- Is a self-replicating program that is
harmful to networks.
- Worm uses the network to duplicate
its code to the hosts on a network, often
without any user intervention.
- Different from the virus because the
worm does not need to attach to a
program to infect the host.
- It harms networks because it
consumes bandwidth.
4. BANDWIDTH - describes the maximum data
transfer rate of a network or
Internet connection.
- measures how much data can be
sent over a specific connection in
a given amount of time.
5. What is Trojan Horse?
- Technically is a worm.
- Does not need to attached to other software
instead Trojan threat is hidden in software that
appears to do one thing, and yet behind the
scenes it does another.
6. Security Procedures
• Use a security plan to determine what will be done
in critical situation.
• Security plan should be constantly updated to
reflect the latest threats to a network.
• To be reviewed every year.
• Conduct tests to determine areas where security is
weak.
8. Virus Protection Software
• Known as Antivirus Software
• Antivirus software designed to detect, disable, and
remove viruses, worms, and Trojans before they infect
a computer.
• Becomes outdated quickly, the technician is
responsible for applying the most recent updates.
SECURITY POLICY - most organizations established this
policy stating that employees are not permitted to install
any software that is not provided by the company.
9. Data Encryption
• Encrypting data involves using codes and ciphers.
• Can help prevent attackers from monitoring or
recording traffic between resources & computers
VPN – Virtual Private Network is any encryption
system that protects data as though it resides on a
private network.
10. Port Protection
• Firewall – is a way of protecting a computer from
intrusion through the ports.
• With port connection, the user can control the type
of data sent to a computer by selecting which ports
will be open & which will be secured.
• Traffic – the data being transported on a network.
11. Enabling Windows 7 Firewall
1. Open Windows 7 Firewall by clicking the Start button, and then clicking
Control Panel. In the search box, type firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you’re prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you
want help protect, and then click OK.