Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

TYPE OF NETWORK ATTACK

DEFINITION

INTRODUCTION

Network attacks are unauthorized actions on the digital assets within an organizational network. ... In passive network attacks, malicious parties gain unauthorized access to networks, monitor, and steal private data without making any alterations. Active network attacks involve modifying, encrypting, or damaging data.

FARIS HAKIMI BIN MUHAMAD ANUAR

the team

AFIF ZUHDI BIN SUHARDI

the team

KU MUHAMMAD ZUL AIMAN BIN KU MOHD NABIL

MUHAMMAD SALMAN SIDDIQ BIN MD ALUDIN

Computer Virus

A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.

PREVENT

Computer Virus

- Use antivirus protection

-Get antispyware software

-Always keep your antivirus protection

TYPE

-Direct Action Virus.

-Web Scripting Virus.

-Polymorphic Virus.

MALWARE

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.

Malware

PREVENT

-Only buy Apps from trusted sources

-Don’t click on suspicious links or download attachments from unknown sources

-Back up data regularly

TYPE

-Spyware.

-Adware.

-Rootkits.

COMPUTER WORM

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

PREVENT

Computer Worm

-Users should know security best practices.

-Avoid putting unknown USBs into computer

-Avoid visiting malicious or unsecure sites that can harbor malware.

TYPE

-Email Worms

-Internet Worms

-File sharing Worms

CONCLUSION

conclusion

Mounting a good defense requires understanding the offense.Hackers use to disrupt and compromise information systems.

So make sure to Keep your systems and anti-virus databases up to date, train your employees, configure your firewall to whitelist only the specific ports and hosts you need, keep your passwords strong, use a least-privilege model in your IT environment, make regular backups, and continuously audit your IT systems for suspicious activity

Learn more about creating dynamic, engaging presentations with Prezi