Css 4th Quarter Week 1
Css 4th Quarter Week 1
Network Security
Security Attacks
Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and
wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Threats to security can come from inside or outside an organization, and the level of potential damage can
vary greatly. Potential threats include the following:
Internal: Employees who have access to data, equipment, and the network. Internal attacks can be
characterized as follows:
Malicious threats are when an employee intends to cause damage.
Accidental threats are when the user damages data or equipment unintentionally.
External: Users outside an organization who do not have authorized access to the network or
resources. External attacks can be characterized as follows:
Unstructured attacks, which use available resources, such as passwords or scripts, to
gain access to and run programs designed to vandalize.
Structured attacks, which use code to access operating systems and software.
Types of Malware
Virus is attached to small pieces of computer code, software, or document. The virus executes
when the software runs on a computer.
Worm is a self-replicating program that is harmful to networks. A worm uses the network to
duplicate its code to the hosts on a network, often without any user intervention.
Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a
Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does
another.
Virus protection software
Known as antivirus software, is software designed to detect, disable, and remove viruses, worms,
and Trojans before they infect a computer. Commonly used antivirus are Norton, Kaspersky, Eset,
Mcafee, Trend Micro, Avast, Avira, AVG and SmadAV.
SmadAV antivirus is used in TESDA Assessment for Computer Systems Servicing NC II. It is a
lightweight antivirus software which provides decent protection form all kind of nasty viruses. This
antivirus software is based on Indonesia but became so popular worldwide because you can use it with
any other antivirus software to make an extra layer of protection.
It has the following key features:
Works with any other antivirus software like AVG, AVAST, Panda etc.
Very light weight and takes low resource to run
Best USB protection to stop spreading virus through USB flush drive
Cleans infected computer and fix the registry changed by the viruses
Adds new viruses in the SmadAV database regularly and keep protected
Updates automatically with the new versions of SmadAV (Pro-version)
Step 4. Click OK with language selection (English) Step 5. Click Next on the Welcome Wizard
Step 6. Accept the license agreement and click Next Step 7. Click Next with Desktop shortcut option
ACTIVITIES
Activity 1
Direction. Identify the following statement. Select your answer from the box below. Write your answer
on the space provided before each number. Answers can be selected more than once.
Physical Malicious threats Accidental threats Unstructured attacks
Data Structured attacks Internal External
Virus Worm Trojan Horse
___________________1. Jayson creates a fake bank website and published it to the internet.
___________________2. Events or attacks that steal, damage, or destroy such equipment as servers,
switches, and wiring.
___________________3. It is a self-replicating program that is harmful to networks.
___________________4. Onel De Guzman created the I love You Virus that can slow down computers
and corrupt files.
___________________5. Kevin is angry on his manager. As revenge, he inflicted virus on his manager’s
computer.
___________________6. Anonymous Philippines vandalizes the Comelec’s Website.
___________________7. Uses code to access operating systems and software.
___________________8. Employees who have access to data, equipment, and the network.
___________________9. Users outside an organization who do not have authorized access to the network
or resources.
___________________10. It is hidden in software that appears to do one thing, and yet behind the scenes
it does another.
___________________11.It is attached to small pieces of computer code, software, or document.
Activity 2. Sequencing: Rearrange the SMADAV installation steps. Use small letter to indicate their order
of precedence.
_______1. Double click on the file from the desktop
_______2. Click Launch and Finish
_______3. Access http://www.smadav.net/ website and click on Free Download
_______4. Click OK with language selection
_______5. Accept the license agreement and click Next
_______6. Wait till save as window appears. Save the file on the Desktop
_______7. Click Install
_______8. Click Next with Desktop shortcut option
_______9. Click Next on the Welcome Wizard
REFLECTION
Why is Network Security important?
REFERENCES
Computer Hardware Servicing E-Learners Manual
http://tecsole.com/how-to-download-smadav-antivirus-for-free
Activity 2. Sequencing
1. c
2. h
3. a
4. d
5. e
6. b
7. g
8. f
9. e