Networking Final

Created by RoxanneJoS 

Upgrade to
remove ads

Networking Principles with Kenneth Mayer Chapter 14

Integrity

Network's programs, data, services, devices, connections soundness

Availability

How consistently, reliably a file or system is accessed (by authorized personnel)

How are Integrity and Availability compromised?

Security - breaches, natural disasters, malicious intruders, power flaws, human error

Unintentional User Error

Harm data, applications, software configurations, hardware

Intentional User Error

Administrators must take precautionary measures to protect network

Malware program or code

Designed to intrude upon or harm system and resources

Malware Examples

Viruses, Trojan horses, worms, bot

Virus

Replication program intent to infect more (through network connections, exchange storage devices)

What are destructive programs often called?

Virus - do not meet strict criteria of a virus .. ex: trojan horse

Types of Malware

Categories based on location and propagation: boot sector viruses, macro virus, file-infector virus, worm, trojan horse, network virus, bot

Malware Characteristic

Making malware harder to detect and eliminate ex. encryption, stealth, polymorphism, time dependence
- can have more than one characteristic

Encryption

used by viruses, worms, Trojan horses; thwart antivirus program's attempts to detect it

Stealth

malware hides itself to prevent detection; disguise themselves as legitimate programs

Polymorphism

change characteristics every time they transfer to new system; use complicated algorithms, incorporate nonsensical commands

Time Dependence

programmed to activate on particular date; can remain dormant, harmless until date arrives; logic bombs: programs designed to start when certain conditions are met

Malware Protection

Not just installing any virus-scanning program or anti-malware software
Requires: choose appropriate anti-malware program, monitoring network, continually updating anti-malware program, education users

Anti-Malware Software

Malware leaves evidence: some detectable only by anti-malware software

User viewable malware symptoms

unexplained file size increases
significant, unexplained system performance
unusual error messages
significant, unexpected system memory loss
periodic, unexpected rebooting
display quality fluctuations

Minimal Anti-Malware Functions

Detect malware through signature scanning (comparing file's content with known malware signatures)
Detect malware through integrity checking (comparing current file characteristics against archived version)
Detect malware by monitoring unexpected file changes
Receive regular updates and modifications
Consistently report only valid instances of malware (heuristic scanning: find malware-like behavior)

Anti-malware software implementation

Dependent upon environment's needs

Key to Anti-Malware Software

Deciding where to install software

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set