VIRUS & FIREWALL BY VIKASH MAINANWAL

Information about VIRUS & FIREWALL BY VIKASH MAINANWAL

Published on August 1, 2014

Author: vikasmainanwal

Source: authorstream.com

Content

A Presentation of Network System VIRUS and FIREWALLS: A Presentation of Network System VIRUS and FIREWALLS Submitted To: Submitted By: Miss Malti Vikash MainanwaI Department of Computer Science & Engineering Punjab Institute of Technology, Kapurthala (PTU Main Campus) *CONTENTS*: *CONTENTS* Virus Virus Types Action To prevent virus Firewalls Types of firewalls PowerPoint Presentation: The battlefield is your PC! War between Good and Evil. Computer Virus: Computer Virus PowerPoint Presentation: What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files PowerPoint Presentation: Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse Script Virus PowerPoint Presentation: Time Bomb A time bomb is a virus program that performs an activity on a particular date PowerPoint Presentation: Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred. PowerPoint Presentation: Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped PowerPoint Presentation: Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk PowerPoint Presentation: Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk PowerPoint Presentation: Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages PowerPoint Presentation: Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged. PowerPoint Presentation: Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers PowerPoint Presentation: Actions to prevent virus infection A lways update your anti-virus software at least weekly. B ack up your important files and ensure that they can be restored. C hange the computer's boot sequence to always start the PC from its hard drive PowerPoint Presentation: Actions to prevent virus infection D on't share Drive C: without a password and without read-only restrictions. E mpty floppy drives of diskettes before turning on computers, especially laptops. PowerPoint Presentation: Actions to prevent virus infection F orget opening unexpected e-mail attachments, even if they're from friends G et trained on your computer's anti-virus software and use it. H ave multiple backups of important files. This lowers the chance that all are infected. PowerPoint Presentation: Actions to prevent virus infection I nstall security updates for your operating system and programs as soon as possible. J ump at the chance to learn more about your computer. This will help you spot viruses. Firewalls: Firewalls Firewall is used to protect the network from unauthorized access. A firewall is a junction of gateway between the two network Types of Firewalls: Types of Firewalls Packet Filtering firewalls Application Gateway Circuit level Gateway Packet filtering firewalls: Packet filtering firewalls A Packet Filter Firewall apply set of rules to each packet based on traffic it decide either forward packet or discard Also called screening router firewall The rules are based on TCP/IP Header Source/Destination IP Address Source/Destination port number Advantage of Packet Firewalls: Advantage of Packet Firewalls Low cost and low impact on network performance Mostly router support packet filtering feature This type of firewall works at network layer Application level Gateway: Application level Gateway Is also called proxy server It acts like a proxy and decide about flow of communication Circuit level Gateway: Circuit level Gateway It works on Session layer and TCP layer This is useful for hiding the information about the protecting network A circuit gateway creates a new connection between itself and remote system Circuit……: Circuit…… Any Query: Any Query

Related presentations


Other presentations created by vikasmainanwal

Manet By Vikas mainanwal
21. 04. 2014
0 views

Manet By Vikas mainanwal

Remote Procedure Call
14. 04. 2015
0 views

Remote Procedure Call