Unit 2 – Assignment 2 Software Utilities? 1
Unit 2 – Assignment 2
Software Utilities?
1
OBJECTIVES
Identify software utility types and examples of common software
Why are software utilities used?
Identify and describe the various networking threats.
Identify different methods of attack.
Describe the features of a firewall and how it can be used to protect against an attack.
Software Utilities? 2
SOFTWARE UTILITIES?
Can be defined as
“A broad range of system software designed to help gather information, configure, optimise and maintain a Computer System”.
Software Utilities? 3
EXAMPLES OF SOFTWARE UTILITIES?Firewall
Virus protection
Clean up tools
Drive Formatting/compression
Software Utilities? 4
TASK
Software Utilities? 5
Task 1 - research the following tools
1. Firewall
2. Virus protection
3. Clean up tools
4. Drive Formatting/compression
Task 2 - Why do we use each of these tools? What are their functions
What are the strengths and weaknesses
THE PURPOSE OF GIVEN SOFTWARE UTILITIESFirewall
Monitor and control traffic to and from a computer system
Virus protection Monitor the computer system to prevent, detect
and remove malware
Clean up tools Removes cookies and temporary files
Drive formatting /Compression Prepare a hard disk for use, provide a File System
Shrink the disk space used by a partition
Software Utilities? 6
POTENTIAL NETWORK THREATS Describe risks of network intrusion
Software Utilities? 7
NETWORKING THREATS Define the sources of network intrusion.
Software Utilities? 8
NETWORKING THREATS Describe social engineering and phishing
Example
Software Utilities? 9
METHODS OF ATTACK Describe viruses, worms, and Trojan horses.
Virus
Worm
Trojan Horse
Software Utilities? 10
METHODS OF ATTACK
Describe viruses, worms, and Trojan horses.
Virus – Requires a Host to spread.
Worm – Able to Self replicate.
Trojan Horse - Comes in disguised as agenuine software or added to genuine software.
Software Utilities? 11
METHODS OF ATTACK Denial of Service and Brute Force attacks
Software Utilities? 12
OTHER MALWARE Spyware
Tracking cookies
Adware
Popup
Task – Determine the difference between these.
Software Utilities? 13
SPAM
Unsolicited email
Typically commercial
1. Dictionary attacks
2. Search the Internet
And web pages for @ sign.
3. Gained from newsgroups and chat rooms
Commercial business exist offer a spamming service
Anti Spam software
Software Utilities? 14
SECURITY PROCEDURES AND APPLICATIONS Define common security procedures
Software Utilities? 15
PHISHING EXAMPLES Gum Tree Phishing examples
How to spot phishingSoftware Utilities? 16
FIREWALL FEATURES AND HOW TO USE THEM TO PROTECT AGAINST AN ATTACK
What is a firewall?
Hardware/Software
PC or router based
One or two way?
Software Utilities? 17
LAYERS WITH TCP/IP AND OSI MODEL
Software Utilities? 18
The firewall operates within
the TCP/IP layers.
Monitors and blocks based on
Port numbers (OSI Layer 4)
APPLICATIONS AND LINKS TO PORT NUMBERS
Application layer name Port number
• DNS 53
• EMAIL 25,110,143
• FTP 21
• Web Server 80
Packet Tracer exercise
Stud share week 6
Software Utilities? 19
FIREWALL TASK
Assignment 2 - Outcome P8 will be carried out within this assignment evidenced by witness statement.
To achieve this carry out all tasks on the witness statement and complete the written tasks, upload these to Turnitin as evidence.
Software Utilities? 20
SUMMARY
Computer and networks can be open to intrusion through vulnerabilities in software, hardware attacks, or the weaknesses of individuals.
Effective security is based on a variety of products and services.
A Firewall controls traffic between networks and helps prevent unauthorized access.
Software Utilities? 21