Page 219 - DCAP207_NETWORKS_DCAP406_COMPUTER_NETWORKS
P. 219
Computer Networks/Networks
Notes viruses are spread through attachments on emails. However, a cautious user action may
prevent the spread of virus because virus requires a user action to insert itself into a
computer. It is therefore suggested that never open an email attachment, which is not
expected, even though the sender appears to be known. However, this preventive measure
will do little to stop worms from infecting the network because worms do not need a host
file and they propagate themselves. When they infect a computer, they often make quick
copies of it and infect an entire network within a few hours. To avoid attacks from viruses
and worms, a latest version of anti virus software should be used.
2. Trojan Horses: This malware attack disguises itself as something innocent like a computer
game or a search results page. Once installed on a computer, the Trojan horse may download
and install a keylogger onto the infected computer to record every keystroke by a
computer’s user, thus stealing vital details of the users. They usually hide themselves in a
downloadable free software on a website. The users should detest themselves from
downloading freeware. It is often observed that organizations block free download software
to prevent themselves from the attack of Trojan horses. Sometimes, a computer infected
with Trojan horse are required to be reformatted, therefore, it is suggested that preventive
steps need to enforced effectively than curing the infected computer system.
3. Spam: Spam constitutes 70 to 84 percent of daily emails sent throughout the world that
demands an ever increasing need for IT resources to filter out this irritating and potentially
malicious menace. Spam email comprises of unsolicited emails promoting products and
coordinated spam attacks to consume so much bandwidth on a network so as to cause it to
crash. Spam may use techniques “news service” spam, which uses legitimate news headlines
to trick recipients into opening spam emails. Good email filters are used to filter the
spams. And much of what slips through can be avoided by staying away not to trick with
the emails. There should be check for signing of any online service or freebie. The naming
system for creating email accounts should not be easily guessable because spammers are
increasingly going through common name lists in order to harvest emails to spam.
4. Phishing: Emails with titles such as, “URGENT: Update Account Status” are all attempts by
a spammer to “phish” the account details. The Phishing refers to spam emails to trick
recipients into clicking on a link to an insecure website and provide details considering
the website as genuine one. Typically, phishing attempts are carried out to steal account
information for e-commerce sites such as banks, eBay or regular financial institutions’
websites. A phishing email tricks the user to click a link, which will take the user to a page
where the user is asked to re-enter all his or her account details including credit card
number(s) and/or passwords. These websites are not actual site, even though they look
like it. To protect the network, users should be cautious and detest themselves to opening
and providing vital details requested by any financial institutions. They should confirm
the integrity before supplying such details. Financial institution should also educate their
employees about the most common ways in which hackers try to phish the account
information.
5. Packet Sniffers: Packet sniffers are the technique used to capture data streams over a
network to obtain sensitive data like usernames, passwords, credit card numbers, etc.
Thus, packet sniffers are more malicious forms of threats to the network security. Packet
sniffers monitor and record details that are coming from and going to a computer over a
compromised network. To get access to a network, packet sniffer use honeypots. They are
simply unsecured wifi access points that hackers create to trap users who are using them.
Making users aware about the threat of packet sniffers is best prevention policy. A user
should be aware not to access the Internet through an unsecured connection. Falling to
packet sniffers technique will lead to compromise with sensitive network data. In addition,
the user should use a variety of different sign on names and passwords to access various
212 LOVELY PROFESSIONAL UNIVERSITY