IT190 UNIT 9 ASSIGNMENT

IT190

References:

  1. What is the risk to the network?
  2. There many threats that can put your network at risks such as viruses, spyware, worms, Trojans and computer hackers. Your networks are also vulnerable cybercriminals who commit cybercrimes.
  3. What risks are there to a computer connected to the network?
  4. If the computer shares the same network then they all are vulnerable if one computer has a virus because viruses are often share by sharing files. Also that if a malicious piece of software found its way in, it is remotely possible that it could travel across the network.
  5. What can I do to protect my network?
  6. Most systems come with some type of security suite or antivirus software. Using this software can protect your system and keeping your system updates current. Remember to change your passwords to include numbers, letter, and symbols.
  7. What ways are there to protect individual computers?
  8. Ways you can protect your individual computer is to have an antivirus software, update your computer, only install trusted software, avoid P2P, delete emails from people you do not know, do not click on ads, run scans frequently, turn firewall on, use a complex password to access your network and run scans frequently.
  9. What are cybercrimes?
  10. Cybercrimes are any criminal activity or crime that involves the internet, a computer system or computer technology. Cybercriminals are individuals who commit cybercrimes using the internet, a computer, and the network to perpetrate crimes. Cybercriminals use computers in three broad ways: one way is that they spread viruses to steal data to your identity. Secondly, they use the computer as a weapon to spam, or fraud. Lastly, cybercriminals use the computer to save stolen or illegal data.
  11. What types of Hackers are there?
  12. White-hat hackers: hacks to test your system vulnerability to prove a point
  13. Black-hat hackers: hacks your system to for illegal purposes
  14. Grey-hat hackers: hacks for fun and to show off but will sell their services
  15. How do hackers access your network?
  16. Hackers have no specific way that they access your system. They may use a virus or if they have direct access to your system they will use a flash drive, Denial-of-Service Attacks (DoS) and Trojans and Rootkits.
  17. What is Identity theft?
  18. Identity theft is a form of stealing someone’s identity in which someone pretends to be you in order to gain access to resources such as obtaining your bank information, credit card numbers, and passwords to access your personal information.
  19. How is identity theft done?
  20. Identity theft is done by using a computer, going through someone’s trash, skimming devices, spyware and hackers use a smart program to gain access to your financial information.
  21. What is a computer virus?
  22. A computer virus is a program or code that is loaded onto your computer without your consent and it begins to spread to other computers when files are shared. Viruses make copies of itself so that it can hide in as many other files as it can. Viruses can also be found on smartphones and tablets
  23. What kind of viruses are there?
  24. Here are the major categories of Viruses:
  25. Boot-sector Viruses: Perform when your computer is turned on/boots up
  26. Logic Bombs/Time Bombs-Preform when a specific condition or date/time is reached
  27. Worms- they spread by themselves with no initiation
  28. Script and Macro Viruses- a set of instruction with a malicious agenda
  29. E-mail Viruses- this is spread as an attachment by way of e-mail and it uses your contacts
  30. Encryption Viruses: attacks files and holds them hostage for ransom to unlock
  31. What are the signs that my computer has a virus?
  32. Some symptoms that your computer may have a virus is that program icons or files may disappear, your homepage may look different and there may be some newly added toolbars. You may experience odd messages or pop-ups and data files may not open because they are corrupted. Your system may begin to take a long time to boot up and programs can completely stop working.
  33. What is a firewall and how do firewalls protect my computer?
  34. A firewall is a software program or hardware used to seek out hacker’s viruses and worms that try to access your computer using the internet. Firewalls protect your computer against spyware, adware, and malware. The firewall protects your computer network in two major ways. First, it blocks access to all logical ports and it keeps your computer network address secure.
  35. What software programs can be used to protect either the network or personal computers from viruses?
  36. McAfee antivirus program, VIPRE Antivirus program and Norton by Symantec- all of these software programs have a built-in security suite, spyware, and antivirus that scans and checks your computer for any threats. They all offer 24-hour technical support and come with a warranty. Some may have they own firewall to also protect your network and can be installed on multiple systems.
  37. How do I know if my computer is secure?
  38. There are websites that test your computer’s vulnerability such as Gibson Research (www.grc..com), ShieldsUp and LeakTest

Evans, A., Martin, K., & Poatsy, M. A. (2014). Technology In Action, Introductory, 11th Edition. [VitalSource Bookshelf version].

The AME Group. (2018). 5 Most Common Network Security Risks (and What They Do). [online] Available at: https://www.theamegroup.com/5-common-network-security-risks/ [Accessed 10 Nov. 2018].

LoveMyTool.com. (2018). 10 Ways to Secure Your Network (by Veronica Henry). [online] Available at: https://www.lovemytool.com/blog/2010/09/10-ways-to-secure-your-network-by-veronica-henry.html [Accessed 10 Nov. 2018].