SlideShare a Scribd company logo
1 of 10
By:Rashed AlKamdah
Grade:10AB
 With an increasing amount of people getting
connected to networks, the security threats that cause
massive harm are increasing also.
 Network security is a major part of a network that
needs to be maintained because information is being
passed between computers etc and is very vulnerable
to attack.
 Over the past five years people that manage network
security have seen a massive increase of hackers and
criminals creating malicious threats that have been
pumped into networks across the world.(Source [1]:
ITSecurity, 2007)
 According to ITSecurity.com the following are ten of the
biggest network threats:
 “1.Viruses and Worms”,
 “2.Trojan Horses”,
 ”3.SPAM”,
 “4.Phishing”,
 “5.Packet Sniffers”,
 ”6. Maliciously Coded Websites”,
 ”7. Password Attacks”,
 “8.Hardware Loss and Residual Data Fragments”,
 “9. Shared Computers”,
 “10.Zombie Computers and Botnets” (ITSecurity [2], 2007)
 A Virus is a “program or piece of code that is
loaded onto your computer without your
knowledge and runs against your wishes
(Webopedia [3], 2007)”.
 Viruses can cause a huge amount of damage to
computers.
 An example of a virus would be if you opened an
email and a malicious piece of code was
downloaded onto your computer causing your
computer to freeze.
 In relation to a network, if a virus is downloaded then
all the computers in the network would be affected
because the virus would make copies of itself and
spread itself across networks (Source [4]:
Trendmicro.com, 2008).
 A worm is similar to a virus but a worm can run itself
whereas a virus needs a host program to run. (Source
[5]: TechFAQ, 2008)
 Solution: Install a security suite, such as Kaspersky
Total Protection, that protects the computer against
threats such as viruses and worms.
 A Trojan Horse is “a program in which malicious or
harmful code is contained inside apparently harmless
programming or data in such a way that it can get control
and do its chosen form of damage, such as ruining the
file allocation table on your hard disk.
(SearchSecurity.com [6], 2004)”
 In a network if a Trojan Horse is installed on a computer
and tampers with the file allocation table it could cause a
massive amount of damage to all computers of that
network.
 Solution: Security suites, such as Norton Internet
Security, will prevent you from downloading Trojan
Horses (Source: Symantec [7], 2007).
 SPAM is “flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
(Spam.abuse.net [7], 2009)”.
 I believe that SPAM wouldn’t be the biggest risk to a
network because even though it may get annoying
and plentiful it still doesn’t destroy any physical
elements of the network.
 Solution: SPAM filters are an effective way to stop
SPAM, these filters come with most of the e-mail
providers online. Also you can buy a variety of SPAM
filters that work effectively.
 Phishing is “an e-mail fraud method in which the
perpetrator sends out legitimate-looking emails in an
attempt to gather personal and financial information from
recipients. (SearchSecurity.com [9], 2003)”
 In my opinion phishing is one of the worst security threats
over a network because a lot of people that use computers
linked up to a network are amateurs and would be very
vulnerable to giving out information that could cause
situations such as theft of money or identity theft.
 Solution: Similar to SPAM use Phishing filters to filter out
this unwanted mail and to prevent threat.
 “A packet sniffer is a device or program that allows
eavesdropping on traffic travelling between networked
computers. The packet sniffer will capture data that is
addressed to other machines, saving it for later analysis.
(Wisegeek.com [10], 2009)”
 In a network a packet sniffer can filter out personal
information and this can lead to areas such as identity theft
so this is a major security threat to a network.
 Solution: “When strong encryption is used, all packets are
unreadable to any but the destination address, making
packet sniffers useless. (Wisegeek.com [11], 2009)” So
one solution is to obtain strong encryption.
 Some websites across the net contain code that is
malicious.
 Malicious code is “Programming code that is capable
of causing harm to availability, integrity of code or
data, or confidentiality in a computer system…
(Answers.com [12], 2009)”
 AVG report that “300,000 infected sites appear per
day (PC Advisor [13], 2009)”
 Solution: Using a security suite, such as AVG, can
detect infected sites and try to prevent the user from
entering the site.

More Related Content

What's hot

Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 

What's hot (20)

Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Network security
Network securityNetwork security
Network security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Network security
Network security Network security
Network security
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Web Security
Web SecurityWeb Security
Web Security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Viewers also liked

Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
pinkutinku26
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network and network security
Network and network securityNetwork and network security
Network and network security
Ruchi Gupta
 

Viewers also liked (20)

Scaling MySQL: Catch 22 of Read Write Splitting
Scaling MySQL: Catch 22 of Read Write SplittingScaling MySQL: Catch 22 of Read Write Splitting
Scaling MySQL: Catch 22 of Read Write Splitting
 
Wsn1
Wsn1Wsn1
Wsn1
 
Security issues
Security issuesSecurity issues
Security issues
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
E securty
E securtyE securty
E securty
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas
 
Party pronto pres new
Party pronto pres newParty pronto pres new
Party pronto pres new
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Network and network security
Network and network securityNetwork and network security
Network and network security
 
Nymble: Blocking System
Nymble: Blocking SystemNymble: Blocking System
Nymble: Blocking System
 
Gprs security threats and solutions
Gprs security threats and solutionsGprs security threats and solutions
Gprs security threats and solutions
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 

Similar to Rashed al kamdah network security threats

Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 

Similar to Rashed al kamdah network security threats (20)

Butti mohammad
Butti mohammadButti mohammad
Butti mohammad
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer worm
Computer wormComputer worm
Computer worm
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Information security
Information securityInformation security
Information security
 
Top 10 Ransomware that might hack your devices
Top 10 Ransomware that might hack your devicesTop 10 Ransomware that might hack your devices
Top 10 Ransomware that might hack your devices
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
C3
C3C3
C3
 
Forensics
ForensicsForensics
Forensics
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Rashed al kamdah network security threats

  • 2.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.  Network security is a major part of a network that needs to be maintained because information is being passed between computers etc and is very vulnerable to attack.  Over the past five years people that manage network security have seen a massive increase of hackers and criminals creating malicious threats that have been pumped into networks across the world.(Source [1]: ITSecurity, 2007)
  • 3.  According to ITSecurity.com the following are ten of the biggest network threats:  “1.Viruses and Worms”,  “2.Trojan Horses”,  ”3.SPAM”,  “4.Phishing”,  “5.Packet Sniffers”,  ”6. Maliciously Coded Websites”,  ”7. Password Attacks”,  “8.Hardware Loss and Residual Data Fragments”,  “9. Shared Computers”,  “10.Zombie Computers and Botnets” (ITSecurity [2], 2007)
  • 4.  A Virus is a “program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes (Webopedia [3], 2007)”.  Viruses can cause a huge amount of damage to computers.  An example of a virus would be if you opened an email and a malicious piece of code was downloaded onto your computer causing your computer to freeze.
  • 5.  In relation to a network, if a virus is downloaded then all the computers in the network would be affected because the virus would make copies of itself and spread itself across networks (Source [4]: Trendmicro.com, 2008).  A worm is similar to a virus but a worm can run itself whereas a virus needs a host program to run. (Source [5]: TechFAQ, 2008)  Solution: Install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms.
  • 6.  A Trojan Horse is “a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. (SearchSecurity.com [6], 2004)”  In a network if a Trojan Horse is installed on a computer and tampers with the file allocation table it could cause a massive amount of damage to all computers of that network.  Solution: Security suites, such as Norton Internet Security, will prevent you from downloading Trojan Horses (Source: Symantec [7], 2007).
  • 7.  SPAM is “flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. (Spam.abuse.net [7], 2009)”.  I believe that SPAM wouldn’t be the biggest risk to a network because even though it may get annoying and plentiful it still doesn’t destroy any physical elements of the network.  Solution: SPAM filters are an effective way to stop SPAM, these filters come with most of the e-mail providers online. Also you can buy a variety of SPAM filters that work effectively.
  • 8.  Phishing is “an e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. (SearchSecurity.com [9], 2003)”  In my opinion phishing is one of the worst security threats over a network because a lot of people that use computers linked up to a network are amateurs and would be very vulnerable to giving out information that could cause situations such as theft of money or identity theft.  Solution: Similar to SPAM use Phishing filters to filter out this unwanted mail and to prevent threat.
  • 9.  “A packet sniffer is a device or program that allows eavesdropping on traffic travelling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis. (Wisegeek.com [10], 2009)”  In a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft so this is a major security threat to a network.  Solution: “When strong encryption is used, all packets are unreadable to any but the destination address, making packet sniffers useless. (Wisegeek.com [11], 2009)” So one solution is to obtain strong encryption.
  • 10.  Some websites across the net contain code that is malicious.  Malicious code is “Programming code that is capable of causing harm to availability, integrity of code or data, or confidentiality in a computer system… (Answers.com [12], 2009)”  AVG report that “300,000 infected sites appear per day (PC Advisor [13], 2009)”  Solution: Using a security suite, such as AVG, can detect infected sites and try to prevent the user from entering the site.

Editor's Notes

  1. I will explain each of these threats individually.