Tuesday, December 10, 2019

Network Trojan

Question: Write a report onsecurity of home network from attack of Trojan. Answer: Introduction This report is about security of home network from attack of Trojan. As we know that Trojan is very much vulnerable virus and it is also known Trojan House. This is actually a type of malware. This virus is actually employed by cyber-thieves and hackers those want to access systems of users to get their confidential information. There are various scenarios exists regarding harmful impact of Trojan virus. Here in this report we will emphasize on a scenario and according to that scenario, a hacker attempting to penetrate home network by attempting subvert to system using a piece of malware which is called Trojan. They are doing this so they can steal important information such as passwords, email correspondence and other essential information regarding system that they can use for implementing DDoS attack. There are various malicious programs that perform various unauthorized actions such as deleting data, blocking data, modifying data and copying data. Besides this, Trojan virus disru pt performance of computers and computer networks. Now the purpose of making this report is to discuss about feasible solution that can provide prevention against this Trojan attack and can minimize risk factors of Trojan Attacks. Now there are various advanced solutions available that can be used for security purpose by users. Overview of Scenario As per the given scenario, it is mentioned above that hackers wants to access home network. Here in this segment of report, we will discuss about our home network and will label workstations with labels. Following is basic figure of our home network that hackers wants to access. Network Components of Diagram In above figure various essential network components are depicted that are mandatory for establishing a secure network. The main components of house network are Internet, External and Internal Firewall, Router, Systems and Database Server. Here Internet is required to establish a network among all systems, so that they can communicate with each other and can send data to each other. Routers are required for spreading network signals to all systems in different departments. Here firewall is used for security purpose and it is an in-built software in operating system and it must be in on mode. Firewall protects systems from unknown and vulnerable entities that can enter into system due to network. A network is accessed by multiple users at one time and this access must be secured. A network in which multiple computers are connected with each other, it is possible that virus can be spread within computers. In this case firewall alerts to users for unknown entity and user can take action accordingly. That is why firewall is considered to be important for maintaining security on network. This house network consists of both wired and wireless devices and some of these devices are easy to configure but some of these are difficult. Besides this, computer systems consist of anti-virus that protects systems from virus attacks. Data storage is done into servers database and all computers are connected with this server. The protection of this server is also important and due to this, anti-virus is also installed into it and firewall of server is always kept in ON mode. Access Control for Security While working with networks, security of these networks must be appropriate. That is why, to maintain security of our network, we have used various ways. Access control is an important way for maintaining security of networks and computers. In access control, users are restricted to access a particular area of network and network administrator sets permissions for different users. For accessing data from server, a user has to use its login credentials such as username and passwords. These credentials are authenticated by servers administrators and allow users to access data from database. In this way, we protect our network devices from various vulnerabilities and virus attacks. (Irchelp.org, 2016)After discussing about overview of scenario, now we will emphasize on IT security information which is related to given case study. IT Security Information Trojan house attack or Trojan attack is one of the most vulnerable attack against computer security. Trojans are executable programs and when user will open file then some actions will be performed. There are many ways in which Trojan horse can be executed. As we know that, in operating system, executable file such as .exe, vbs, bat etc. are found. Trojan is also executable program and it is named with file dmsetup.exe, LETTER-FOR-YOU.TXT.vbs. These are some unknown file names and consists of vulnerable information in it. While implementing Trojan based attack, some steps are executed by attackers that include: Entry, Distribution of Traffic, Exploit, Infection and Execution. (Webopedia.com, 2016) Steps to Minimizing Trojan Based Attack As we have discussed above that Trojan based attack is so much harmful and it puts bad influence on our house network. Now it is necessary to minimizing the vulnerable effect of this attack and here in this segment we will discuss about steps to minimizing Trojan Based Attack. (Eckel, 2009) Installation Quality Anti-Virus Installation Real-Time Anti-Spyware Protection Use Anti-Malware Applications Daily Scans must be Involved Auto-run must be DisabledApproach for Workstation and Network Level Security To get prevention from Trojan virus attack, prevention can be got both at workstation/device and network level. To get network level prevention, there is requirement to use anti-virus and anti-malware software those can detect Trojan virus and can destroy it. Besides this, monitoring tools can also be used for identifying network virus. On the behalf of device and workstation, anti-virus can also be used for detecting and destroying viruses. At device level, firewall must be in on mode, so that it can restrict unknown entity to enter into system. In this way, by using these approaches, virus attack can be controlled at workstation and network level. (WhatIs.com, 2016) Major Security Problems As we have discussed above about our house network with its components and these components are essential for establishing a reliable and secured network. But still we are facing a problems while implementing this house network. Following are some major security problems in our house network: The first security problem is regarding improper use of firewall. Firewall must be in on mode. Anti-virus must be installed into computer systems to detect and destroy virus. Without anti-virus protection, it is difficult to save computers from viruses. Improper configuration of network that allows hackers to access weak points of network. (CertificationKits.com, 2016)This is an important segment of this report where we will discuss about countermeasures to protect network. There is requirement to use network security tools such as anti-virus, spyware and other network security tools. Security of server is required, that is why it must be protected with advanced anti-virus, permissions must be given to connected users for accessing data. These are some essential countermeasures that can be implemented to get protection for house network. (Benton, Benton, B., Moreno, 2014) Security Principle for maintaining Security of Home Network The main security principle for maintaining security of Home Network is to maintain confidentiality, integrity and availability of database that consists of confidential information in it. (Study.com, 2016) Security Approach for Home Network After this whole discussion about security tools and techniques for securing network from Trojan virus attacks, we have selected to use anti-virus. This is because anti-virus installation into system will protect the system from outer vulnerabilities and will not allow them to enter into system without scanning. (Computernetworkingnotes.com, 2016) Lesson about Solving Problem After this whole discussion, we got to know that network usage and implementation are not easy to manage by network users and developers. There is requirement to configure network and its components properly and advanced security tools must be used. In this report we have discussed about Trojan Virus thoroughly and awareness about this virus and other viruses is necessary to resolve virus attacks. Now on the behalf of whole discussion we will try to protect home network from various unknown and vulnerable activities. Both at developers and users levels, security must be maintained properly. (Bhconsulting.ie, 2014) References Eckel, E. (2009). 10 ways to avoid viruses and spyware - TechRepublic. [online] TechRepublic. Available at: https://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/ [Accessed 1 Aug. 2016]. Irchelp.org. (2016). IRCHelp.org Trojan Horses. [online] Available at: https://www.irchelp.org/irchelp/security/trojan.html [Accessed 1 Aug. 2016]. CertificationKits.com. (2016). CCNA Security: Worm, Virus and Trojan Horse Attacks. [online] Available at: https://www.certificationkits.com/cisco-certification/ccna-security-certification-topics/ccna-security-describe-security-threats/ccna-security-worm-virus-and-trojan-horse-attacks/ [Accessed 1 Aug. 2016].Computernetworkingnotes.com. (2016). Network Security Threat and Solutions. [online] Available at: https://computernetworkingnotes.com/ccna-study-guide/network-security-threat-and-solutions.html [Accessed 1 Aug. 2016]. Benton, Benton, B., Moreno,. (2014). Infected! 10 Tips How To Prevent Malware On Your Computer. Line//Sha pe//Space. Retrieved 2 August 2016, from https://lineshapespace.com/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/WhatIs.com. (2016). What is Trojan horse? - Definition from SearchSecurity. Retrieved 2 August 2016, from https://searchsecurity.techtarget.com/definition/Trojan-horseBhconsulting.ie. (2014). Computer Security Threats Solutions | SecurityWatch. Retrieved 3 August 2016, from https://bhconsulting.ie/securitywatch/?p=2366Slideshare.net. (2009). Network Security Threats and Solutions. Retrieved 3 August 2016, from https://www.slideshare.net/Colin058/network-security-threats-and-solutions-1018888Webopedia.com. (2016). The Difference Between a Virus, Worm and Trojan Horse - Webopedia. Retrieved 3 August 2016, from https://www.webopedia.com/DidYouKnow/Internet/virus.aspStudy.com. (2016). What is a Trojan Horse Virus? - Definition, Examples Removal Options - Video Lesson Transcript. Retrieved 3 August 2016, from https://study.com/academy/lesson/what-is-a-tro jan-horse-virus-definition-examples-removal-options.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.