2)+Introduction

=** Network Security **=



** Overview: **

 * In network security, a threat is anything that could harm information or systems creating, receiving, maintaining or transmitting information by exercising a vulnerability. A vulnerability is a flaw or weakness in a system. **
 * There are literally thousands of different viruses and malicious software programs that can damage your computer or network. The types of malicious software programs vary, but are generally the following: **
 * **#** || **Type** || **Description** ||
 * **1** || **Virus** || **A program that copies itself into another program, sectors on a drive, or items that support scripts. Most viruses only copy themselves, while a minority unleash a payload, which is the action generated by the virus. Payloads can damage files, corrupt hard drives, display messages, or open other files. Typically, the payload is delivered when a certain condition occurs, such as when the date on the computer reaches a particular day.** ||
 * **2** || **Worm** || **A more effective form of virus that finds vulnerable systems and then copies itself into those systems. The most frequent methods of propagation are from email distribution lists, email signature scripts, and shared folders on the network. Worms may or may not have a damaging payload. Currently the typical payload for a worm is making the computer more susceptible to other malicious viruses.** ||
 * **3** || **Hoax** || **An email that usually states that it is harming the computer, but does not actually perform what it states. Some hoaxes ask the reader of the email to perform a damaging process, like deleting an important file. Most hoaxes are spread by well-meaning individuals hoping to alert others to a potential virus that in reality is just a hoax.** ||
 * **4** || **Trojan** || **A Trojan or Trojan Horse is a program generally designed to impact the security of a system. The program is usually disguised as something else (a benign program) or is masqueraded as a legitimate file that the user would expect to see, or want to load, on the system. The payload of a Trojan is usually delivered as soon as it is opened and usually with devastating results. Trojans are often used to create back-doors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network. Trojans are most often delivered as an attachment to a seemingly innocent chain email.** ||


 * Goals: **
 * **To discuss the possible vulnerabilities that would be exploited using worms (specifically Sasser and Stuxnet worms) to harm the security of a network system.**
 * **To illustrate defense techniques that an organization would implement to secure its network system.**