-
Essay / Network Security Threats - 1629
IntroductionA threat is anything that poses a danger to information assets. There are many diverse threats that pose a constant danger to the information assets of individuals and organizations. This report will cover four significant threats and their countermeasures. These threats are network threats, wireless network threats, physical threats and web browsing threats. A network threat is any form of security breach that may include any of the following: viruses, worms, Trojan horses, spyware, adware, and spam. There are three main threats. types of viruses which are computer viruses, macro viruses and boot viruses. Computer viruses are harmful malicious codes that are attached to programs. Once the program containing these codes is activated, it starts wreaking havoc on the computer. Additionally, just like real viruses, these viruses attempt to replicate themselves on other computers through various means. Another type of virus is the macro virus, “which is embedded in the auto-running macro code used by word processors, spreadsheets, and database applications” (Whitman and Mattord, 2012, p. 47). The last type of virus is the startup virus. which infects and targets only key operating system files in the boot section of the computer. Worms are another threat similar to a virus, but unlike viruses, worms do not need to be attached to other programs. Worms are malicious programs that replicate themselves automatically and constantly until they exhaust all available resources on the computer. The Trojan is also similar to a virus because it must attach itself to other programs to become activated. However, there is a difference in what it does. Instead of damaging the computer when activated, it creates a hidden backdoor to the middle of the paper...... ensures secure communication during an online transaction. The next step after securing communications is to identify secure websites. Modern web browsers clearly indicate which websites are secure by displaying a green color on the URL. Another method to identify secure websites is to check the security certificate they use. Generally secure websites use a trusted and recognized security certificate. On the other hand, insecure websites use no certificates or unknown certificates. In conclusion, the danger of threats will always be present, regardless of the level of security implemented. However, having the means to reduce and counter these threats can greatly minimize their damage. Works Cited Whitman, ME and Mattord, HJ (2012). Principles of Information Security (4. ed., International ed.). Boston, Massachusetts: Technology Class.