Network Security Threats

1629 Words4 Pages

Introduction

A threat is anything that represents a danger to information assets. There are many various threats that represent a constant danger to individuals and organizations information assets. This report will cover four important threats and their countermeasures. These threats are network threats, wireless network threats, physical threats and web browsing threats

A network threat is any form of security breaches that may include any of the following: viruses, worms, Trojan horses, spyware, adware and spam emails.

There are three main types of viruses which are computer virus, macro virus and boot virus.

Computer viruses are harmful malicious codes which are attached to programs. Once the program containing these codes activities it begins to wreak havoc on the computer. What’s more is that just like real viruses these viruses try to replicate themselves to other computers using various means. Another type of virus is a macro virus, “which is embedded in automatically executing macro code used by word processors, spread sheets, and database applications” (Whitman& Mattord, 2012, p.47).The last type of virus is the boot virus which infects and targets only key files of the operating system in the computer boot section. Another threat similar to a virus is worms though unlike viruses worms do not need to be attached to other programs. Worms are malicious programs which automatically and constantly replicate themselves until they use up all available resources on the computer. The Trojan horse is also similar to a virus because it needs to attach itself to other programs to activate. However there is a difference in what it does. Instead of damaging the computer when it is activated it creates a hidden back door to the ...

... middle of paper ...

...rovide secure communication during online transaction. Next step after securing communication is identifying secure websites. Modern web browsers make it clear what websites are secure by showing green colour on the URL. Another method to identify secure websites is by checking what security certificate they are using. Usually secure websites use approved and recognized security certificate. On the other hand insecure websites use no certificates or unknown certificates.

In conclusion the danger of threats will always be present no matter how much security is implemented. However having the means to reduce and counter these threats can minimize their damage greatly.

Works Cited

Whitman, M. E., & Mattord, H. J. (2012). Principles of information security (4. ed., international ed.). Boston, Mass.: Course Technology.

Open Document