You are on page 1of 3

1.

Define Network Security


-The use of both hardware and software methods by any business or
organization to safeguard its computer network and data. This seeks to protect
the network's and data's confidentiality and accessibility. Every business or
organization that deals with a lot of data has some kind of defense against
various cyberthreats.

Source: https://www.geeksforgeeks.org/network-security/

2. Passive vs. Active Attacks

BASIS OF COMPARISON ACTIVE PASSIVE


DEFINITION the attacker intercepts the attacker observes the
the connection and messages, then copy and
efforts to modify the save them and can use it
message's content. for malicious purposes.

MODIFICATION The attacker modifies information remains


the actual information. unchanged.

VICTIM The victim gets notified Victims do not get


about the attack. informed about the
attack.
DANGEROUS TO Integrity and availability Confidentiality of the
of the message. message.

SYSTEM IMPACT Can harm the system Do not harm the system
EMPHASIS Attention is on Attention is on
detection. prevention.
PREVENTION Tough to restrict from Easy to prohibit.
entering systems or
networks.

Source:
https://www.javatpoint.com/active-attack-vs-passive-attack
3. MALICIOUS SOFTWARE OVER THE NETWORK
Definition:
-Is a file or code, typically delivered over a network, that infects, explores,
steals or conducts virtually any behavior an attacker wants. And because
malware comes in so many variants, there are numerous methods to infect
computer systems. Mainly use for the purpose of stealing sensitive data,
investigate the infected user’s local network, provide remote control for an
attacker to use an infected machine, send spam from the infected machine to
unsuspecting targets

-is short for malicious software and used as a single term to refer to virus, spy
ware, worm etc. Malware is designed to cause damage to a stand-alone
computer or a networked pc. So wherever a malware term is used it means a
program which is designed to damage your computer it may be a virus, worm or
Trojan.

EXAMPLE OF MALICIOUS SOFTWARE OVER THE NETWORK

Cryptojacking – is malicious cryptomining (the process of using computing


power to verify transactions on a blockchain network and earning
cryptocurrency for providing that service) that happens when cybercriminals
hack into both business and personal computers, laptops, and mobile devices to
install software.

Malvertising – Malvertising is a portmanteau of “malware + advertising”


describing the practice of online advertising to spread malware. It typically
involves injecting malicious code or malware-laden advertisements into
legitimate online advertising networks and webpages.

Adware- Generically adware is a software application in which advertising


banners are displayed while any program is running. Adware can automatically
get downloaded to your system while browsing any website and can be viewed
through pop-up windows or through a bar that appears on a computer screen
automatically. Adwares are used by companies for marketing purpose.

Tracking cookies- A cookie is a plain text file that is stored on your computer in
a cookies folder and it stores data about your browsing session. Cookies are
used by many websites to track visitor information A tracking cookie is a cookie
which keeps tracks of all your browsing information and this is used by hackers
and companies to know all your personal details like bank account details, your
credit card information etc. which is dangerous.
Spam-Spamming is a method of flooding the Internet with copies of the same
message. Most spams are commercial advertisements which are sent as an
unwanted email to users. Spams are also known as Electronic junk mails or junk
newsgroup postings. These spam mails are very annoying as it keeps coming
every day and keeps your mailbox full.

Misleading applications- Misleading applications misguide you about the


security status of your computer and shows you that your computer is infected
by some malware and you have to download the tool to remove the threat. As
you download the tool it shows some threats in your computer and to remove it
you have to buy the product for which it asks some personal information like
credit card information etc. which is dangerous.

Sources

https://www.paloaltonetworks.com/cyberpedia/what-is-
malware#:~:text=Malware%20Definition,methods%20to%20infect%20computer
%20systems.

https://www.websecurity.digicert.com/security-topics/what-are-malware-
viruses-spyware-and-cookies-and-what-differentiates-them

You might also like