Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Network attacks are unauthorized actions on the digital assets within an organizational network. ... In passive network attacks, malicious parties gain unauthorized access to networks, monitor, and steal private data without making any alterations. Active network attacks involve modifying, encrypting, or damaging data.
FARIS HAKIMI BIN MUHAMAD ANUAR
AFIF ZUHDI BIN SUHARDI
KU MUHAMMAD ZUL AIMAN BIN KU MOHD NABIL
MUHAMMAD SALMAN SIDDIQ BIN MD ALUDIN
Computer Virus
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
PREVENT
- Use antivirus protection
-Get antispyware software
-Always keep your antivirus protection
Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
PREVENT
-Only buy Apps from trusted sources
-Don’t click on suspicious links or download attachments from unknown sources
-Back up data regularly
A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
PREVENT
-Users should know security best practices.
-Avoid putting unknown USBs into computer
-Avoid visiting malicious or unsecure sites that can harbor malware.
Mounting a good defense requires understanding the offense.Hackers use to disrupt and compromise information systems.
So make sure to Keep your systems and anti-virus databases up to date, train your employees, configure your firewall to whitelist only the specific ports and hosts you need, keep your passwords strong, use a least-privilege model in your IT environment, make regular backups, and continuously audit your IT systems for suspicious activity