Different types of security threats
At the present situation, whole world has been highly dependent on the IT services and internet. In this context, more people are getting connected to the computer networks. With this increasing amount of people to the computer networks, the security threats are becoming too dangerous to the people. In the past few years, the hacking activities and attacks have been increased to a very high number. Computer and network security means the protection of data from the unauthentic access. Various types of security threats are using by the hacker or attackers for getting the unauthentic access to a computer network. In this essay, some of the most popular network security threats and the required measures for avoiding the threats have been discussed in this essay.
Malware, also known as malicious software program, is any program or segment of code within a program that is unsafe to a PC. Malware incorporates PC infections, worms, Trojan steeds and spyware. These noxious projects can play out an assortment of capacities, including taking, scrambling or erasing touchy information, modifying or seizing center figuring capacities and checking clients’ PC movement without their consent (Chen, Ji and Zhang 2013). There are diverse sorts of malware that contain one of a kind attributes and qualities. An infection is the most widely recognized sort of malware, and it’s characterized as a malignant program that can execute itself and spreads by contaminating different projects or records. A worm is a sort of malware that can self-repeat without a host program; worms regularly spread with no human cooperation or mandates from the malware writers (Agbogun and Ejiga 2013). A Trojan stallion is a noxious program that is intended to show up as a real program; once initiated taking after establishment, Trojans can execute their pernicious capacities (Acemoglu, Malekian and Ozdaglar 2016). Spyware is a sort of malware that is intended to gather data and information on clients and watch their movement without any knowledge of the user of the computer or the network.
This is a program that seems safe, however is, truth be told, pernicious. The term originates from Greek mythology about the Trojan War. As indicated by legend, the Greeks assembled a vast wooden steed that the general population of Troy maneuvered into the city. Amid the night, troopers who had been stowing away inside the stallion rose, cleared a path for let their kindred fighters in and afterward overran the city (Lee, Chiu and Li 2015). A Trojan steed containing malware may likewise be alluded to as basically a Trojan or a Trojan steed infection. Not at all like a genuine infection, be that as it may, malware in a Trojan stallion does not imitate itself, nor would it be able to engender without the end client’s help. Since the client is frequently uninformed that he has introduced a Trojan stallion, the processing gadget’s security relies on its antimalware programming perceiving the malevolent code, disconnecting it and expelling it. Surprising changes to PC settings and bizarre action notwithstanding when the PC ought to be sit still are solid signs that a Trojan or other malware is dwelling on a PC (Lee, Chung and Hwang 2013). To abstain from being contaminated by Trojan malware, clients ought to stay up with the latest, never download documents or projects from untrusted sources, and dependably filter new records with antivirus programming before opening them.
Malware
A rootkit is an accumulation of instruments (projects) that empower head level access to a PC or PC arrange. Normally, a wafer introduces a rootkit on a PC after first getting client level get to, either by abusing a known powerlessness or splitting a watchword. Once the rootkit is introduced, it enables the aggressor to cover interruption and pick up root or favored access to the PC and, conceivably, different machines on the system. A rootkit may comprise of spyware and different projects that: screen activity and keystrokes; make an “indirect access” into the framework for the programmer’s utilization; modify log records; assault different machines on the system; and adjust existing framework devices to escape recognition (Herzberg and Shulman 2014). The nearness of a rootkit on a system was first recorded in the mid 1990s. Around then, Sun and Linux working frameworks were the essential focuses for a programmer hoping to introduce a rootkit (Bejtlich 2013). Today, rootkits are accessible for various working frameworks, including Windows, and are progressively hard to recognize on any system.
Phishing is a type of misrepresentation in which the aggressor tries to learn data, for example, login accreditations or record data by taking on the appearance of a trustworthy substance or individual in email, IM or other correspondence channels. Regularly a casualty gets a message that seems to have been sent by a known contact or association. A connection or connections in the message may introduce malware on the client’s gadget or direct them to a malevolent site set up to deceive them into uncovering individual and monetary data, for example, passwords, account IDs or Mastercard points of interest. Phishing is a homophone of angling, which includes utilizing baits to catch angle (Guo et al. 2015). Phishing is prominent with cybercriminals, as it is far simpler to trap somebody into clicking a malevolent connection in an apparently authentic email than attempting to get through a PC’s barriers. Albeit some phishing messages are ineffectively composed and obviously fake, complex cybercriminals utilize the strategies of expert advertisers to distinguish the best sorts of messages – the phishing “snares” that get the most noteworthy “open” or active visitor clicking percentage and the Facebook posts that create the most likes. Phishing efforts are frequently worked around the year’s significant occasions, occasions and commemorations, or exploit breaking news stories, both genuine and imaginary (Zhuang et al. 2013).
Protection of the computer system and the network with strong security software is the first necessary steps for defending against the security threats discussed in the section above. The security software programs are generally known as antivirus software and firewalls. The computer networks need to use a security-conscious Internet Service Protocol (ISP). The computer systems should enable the automatic update of the system software (Agbogun and Ejiga 2013). Extreme level of caution should be taken at the time of opening attachment sent over the internet. The users need to be careful at the time of peer to peer file sharing over the network or the internet. The computer systems need to use the latest updated browser software for browsing the internet. Security precautions like local area network password and individual password need to use in the attached devices to the network (Bejtlich 2013). Another recommendation for avoiding the data loss due to the attacks, the users should keep back of the important files regularly.
Trojan horse
The antivirus software programs are effective to resist the execution of the virus or malware programs within the computer system. The antivirus software is able to scan all the programs installed in a system and detect the malware programs and remove them from the system. Whenever a new software program is being installed in the system, the antivirus program scans the codes of the program and check whether the programs is malware or safe for the system. Every day, the hackers are developing and launching new virus and malware programs in the internet. In this context, the antivirus programs need to be up to date all time.
The firewall programs are effective for resisting the attacks from the outside of the network. Firewalls can defend against attacks on hosts (including spoofing attacks), application protocols, and applications. In addition, firewalls provide a central method for administering security on a network and for logging incoming and outgoing traffic to allow for accountability of user actions and for triggering incident response activity if unauthorized activity occurs. Passwords and backup from the personal initiative of the users would help them to secure the data from the external attackers.
Conclusion:
Network security is a big concern in this highly technology dependent world. Most of the people in this world are connected to the internet and important data of the users are accessible over the network they are connected. In this context, Malware, Trojan horse, Rootkits, Phishing are some of the most serious security threats. These programs or techniques are using by the hackers or the attackers for getting the unauthentic which are great fear to the computer system users who are connected to the internet. In order to get rid off from these security threats, the users need to take some security precautions which have been discussed at the end of this report.
References:
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal of Economic Theory, 166, pp.536-585.
Agbogun, J.B. and Ejiga, F.A., 2013. Network Security Management. Network Security, 2(04).
Bejtlich, R., 2013. The practice of network security monitoring: understanding incident detection and response. No Starch Press.
Chen, L., Ji, J. and Zhang, Z., 2013. Wireless network security. Higher Education Press: Beijing.
Guo, J.C., Fan, D., Che, H.Y., Duan, Y.N., Wang, H.S. and Zhang, D.W., 2015. An approach to network security evaluation of computer network information system with triangular fuzzy information. Journal of Intelligent & Fuzzy Systems, 28(5), pp.2029-2035.
Herzberg, A. and Shulman, H., 2014. Retrofitting security into network protocols: the case of DNSSEC. IEEE Internet Computing, 18(1), pp.66-71.
Lee, C.C., Chiu, S.T. and Li, C.T., 2015. Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. IJ Network Security, 17(1), pp.1-6.
Lee, C.C., Chung, P.S. and Hwang, M.S., 2013. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. IJ Network Security, 15(4), pp.231-240.
Soltani, S., Seno, S.A.H., Nezhadkamali, M. and Budiarto, R., 2014. A survey on real world botnets and detection mechanisms. International Journal of Information and Network Security, 3(2), p.116.
Zhuang, R., Zhang, S., Bardas, A., DeLoach, S.A., Ou, X. and Singhal, A., 2013, August. Investigating the application of moving target defenses to network security. In Resilient Control Systems (ISRCS), 2013 6th International Symposium on (pp. 162-169). IEEE.