TITLE: PERSONAL NETWORK SECURITY
Computer security is the process of detecting unauthorised use of your computer or PC . As the old saying goes “prevention is better than cure” , going by this we realise that if we learn about the possible loopholes in the security we can prevent it in the first place.
But the big question is 'why should i care about my computer security?' . We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs.Although we may not consider our communiction a 'top secret' ,but you dont want others to eavesdrop on you conversations, read your mails, use your computer to attack ...view middle of the document...
Information security is concerned with three main areas:
Confidentiality – informations should be available to only those who rightfully have access to it
Integrity – information should be modified only by those who are authorized to do so
Availability—information should be accessible to those who need it when they need it
These concepts apply to home Internet users as well as businesses. Now lets take a look at the various kinds of attacks and risks on Personal computers connected to the internet.
Trogan horse program:Trogan programs are a common way to trick users to install 'Backdoor' programs. These can allow the attackers to easily access the computer without the knowlege of the user and change configuration or infect all the files.
Denial of Service:This type of attack loads your system beyond capacity so that it crashes. In most cases these attacks can be prevented through latest patches.
Cross-site scripting : In this kind of attack a web developer may attach a script to something sent to a web site such as a URL etc. When the website responds to you, the malicious script is transferred to your browser. These scripts can do damage to the system.
E-mail spoofing:Email 'spoofing' is when an e-mail message appears to have originated from one source when it actually was sent from another source.E-mail spoofing is often an attempt to trick the user into revealing sensitive information like bank info , passwords etc.E-mail spoofing can range from harmless pranks to social engineering ploys.
E-mail viruses: Viruses and other types of malicious code are often spread as attachments to e-mail message. Before oppening an attachment be sure you know the real source of that attachment. The melissa virus spread precisely because it originated from familiar address.
Chat client :Internet chat applications, such as IRC network , provide a mechanism for information to be transmitted bi-directional between computers on the internet. Chat clients provide groups of indivisual with the means to exchange dialog, web URL's , and in many cases, files of any type.
Packet sniffing: A packet sniffer is a program that captures data from information packets as they travel over the network. The data may include user names, passwords, and proprietary information that travels over the network in clear text.With perhaps hundreds or thousands of passwords captured by the sniffer ,intruders can launch widespread attacks on systems.