Sie sind auf Seite 1von 10

RESEARCH

PAPER

IN T.L.E

SUBMITTED BY: EVA N.YAMSON

10-ARGENTINA

SUBMITTED TO: MR.RYAN HEINJIE


T.TUMAQUE

TEACHER IN T.L.E
1. What is Network Security?

- Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is
a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks
and data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure,
requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in
the wild today.

https://www.forcepoint.com/cyber-edu/network-security

2. Why security in computer system and networks is important?

- Network security is one of the most important aspects to consider when working over the internet, LAN or other method,
no matter how small or big your business is. While there is no network that is immune to attacks, a stable and efficient
network security system is essential to protecting client data. A good network security system helps business reduce the
risk of falling victim of data theft and sabotage. Network security helps protect your workstations from harmful spyware. It
also ensures that shared data is kept secure. Network security infrastructure provides several levels of protection to
prevent MiM attacks by breaking down information into numerous parts, encrypting these parts and transmitting them
through independent paths thus preventing cases like eavesdropping.

https://www.ecpi.edu/blog/importance-of-network-security-safety-in-the-digital-world

3. Define the ff. terminologies virus, data encryption, firewall, bandwidth.

 Virus - is a type of computer program that, when executed, replicates itself by modifying other computer
programs and inserting its own code.When this replication succeeds, the affected areas are then said to be
"infected" with a computer virus.
https://en.wikipedia.org/wiki/Computer_virus
 Data Encryption - is a security method where information is encoded and can only be accessed or decrypted by
a user with the correct encryption key. Encrypted data, also known as ciphertext, appears scrambled or
unreadable to a person or entity accessing without permission.
https://www.forcepoint.com/cyber-edu/data-encryption
 Firewall - is a network security device that monitors incoming and outgoing network traffic and permits or blocks
data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network
and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and
hackers.
https://www.forcepoint.com/cyber-edu/firewall
 Bandwith - is used to describe network speeds, it does not measure how fast bits of data move from one location
to another. Since data packets travel over electronic or fiber optic cables, the speed of each bit transferred is
negligible. Instead, bandwidth measures how much data can flow through a specific connection at one time.
https://techterms.com/definition/bandwidth

4. What are the different types of viruses?

 Resident Virus

Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption
of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.

 Multipartite Virus

This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your
operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files
and the boots sector.

 Direct Action Virus


Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate
and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can
be easily removed by antivirus programs.

 Browser Hijacker

This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain
name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On
the other hand, most trusted browsers have built-in features to block them ahead.

 Overwrite Virus

From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even
programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.

 Web Scripting Virus

This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes
in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.

 Boot Sector Virus

Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer.
Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some
examples include Polyboot.B and AntiEXE.

 Macro Virus

Macro viruses target applications and software that contain macros. These viruses can carry out series of operations
affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas,
Melissa.A, and Relax.

 Directory Virus

Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus
program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected
with directory viruses.

 Polymorphic Virus

Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus
software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic
viruses include Satan Bug, Elkern, Tuareg, and Marburg.

 File Infector Virus

This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as
well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to
this category.

 Encrypted Virus

This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be
detected when they decrypt themselves during replication. Although they don’t delete files or folders, they can badly affect
PC performance.

 Companion Virus
This is a type of virus that doesn’t survive without accompanying an existing file or folder. In order to carry out damages,
the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion
viruses include Terrax.1069, Stator, and Asimov.1539.

 Network Virus

Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses
replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for
their potential prey. Dangerous network viruses include Nimda and SQLSlammer.

 Nonresident Virus

Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.

 Stealth Virus

Stealth viruses trick antivirus software by appearing like they are real files or programs and by intercepting its requests to
the OS. Some antivirus software cannot detect them. Sometimes, it temporarily removes itself from the system without
deletion.

 Sparse Infector

Sparse infectors use different techniques to minimize its detection. They are viruses that infect “occasionally”. For
example, they may only want to infect a program every tenth execution. Because they are occasional infectors, antivirus
software has a hard time detecting them.

 Spacefiller Virus

Also known as “cavity” viruses, spacefillers attach themselves to the file and can alter the start of the program or change
the encrypted code. They also implement stealth techniques so that users cannot determine the increase the file code.
The most popular Spacefiller is the Lehigh virus.

 FAT Virus

Basically, this type of virus ruins file allocation system where the information about files, including the location, exist.

 Others

Other threats are not technically called as “virus”, but they also have the same damaging effects as viruses. This includes
worms, adware, malware, Trojan, and ransomware.

To prevent these viruses from affecting your computer, it is important that you install the best and the most competitive
antivirus software that can detect, block, and eliminate all types of computer viruses.

https://www.voipshield.com/20-common-types-of-viruses-affecting-your-computer/

5. What are the most common known anti virus software?

 Avast - 17.4% worldwide market share


 Microsoft - 13.2% worldwide market share
 ESET - 11.1% worldwide market share
 Symantec - 10.3% worldwide market share
 AVG - 10.1% worldwide market share
 Avira - 9.6% worldwide market share
 Kaspersky - 6.7% worldwide market share
 McAfee - 4.9% worldwide market share
 Panda - 2.9% worldwide market share
 Trend Micro - 2.8% worldwide market share
 Other - 11.1% worldwide market share

https://www.zdnet.com/article/which-is-the-most-popular-antivirus-software/

6. Research the ff: a. how to enable firewall for windows xp, 7,8,10?

 Windows XP

Step 1: From the Windows control panel, open the Windows Firewall application.

Step 2: Make sure the Firewall is set to “On”.

If the Firewall is set to “Off” then this article doesn’t apply as you’re already letting all the outside traffic in without
exception.

Step 3: Click the “Exceptions” tab.

This will bring up the window showing the current exceptions configured. Some pre-configured exceptions may already
exist. If so, leave them as is or you may prevent other applications from working properly.

Step 4: Click the “Add a Port” button.

Step 5: Add the proper settings for your application.

For this example we’re going to assume you are trying to run a webserver on port 80. Pick a name for your service, in this
case HTTP, and then fill in the port number (80). Select TCP as the protocol.

Step 6: Click OK to save your settings.

You should see your new firewall rule here. At this time you can edit it, delete it, or add another rule using the same
procedure as outlined above. You can have as many rules as you have applications that need one. If your application
needs a different port open, say port 3389 for Remote Desktop, then use the appropriate port. Click OK to close the
Firewall window and save your settings.

Remember that the more holes you create here, the more potential you create for someone to access your machine from
the Internet. Use caution and only open whatever ports are necessary for your application(s) to function properly.

https://www.noip.com/support/knowledgebase/configuring-windows-xp-firewall

 Windows 7

Step 1: Choose Start→Control Panel→System and Security→Windows Firewall.

Step 2 : Click the Turn Windows Firewall On or Off link in the left pane of the window.

The Windows Firewall Customize Settings window opens.

Step 3: Select the Turn on Windows Firewall radio button for one or both of the network locations. Click OK.

Step 4: You can choose to impose a different level of security on each of the network types: Home or Work (Private)
Network Location Settings and Public Network Location Settings.

Step 5: Click the Close button to close Windows Security Center and the Control Panel.

https://www.dummies.com/computers/operating-systems/windows-7/how-to-enable-the-windows-7-firewall/

 Windows 8 or 10
Step 1: Press the Windows key, type Windows Defender Firewall, and then press Enter.
Step 2: On the left side of the screen, under Control Panel Home, select Turn Windows Defender Firewall on or off.

Step 3: In the Customize Settings window, click the circle(s) next to Turn on
Windows Defender Firewall for public networks, private networks, or both.

Step 4: When you're finished, click the button.

https://www.computerhope.com/issues/ch000551.htm

7. What is LEAP, WPA, WEP 128 AND 64, WTLS?

Lightweight Extensible Authentication Protocol (LEAP)

- is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are
dynamic WEP keys and mutual authentication (between a wireless client and a RADIUS server). LEAP allows for clients
to re-authenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that
the WEP keys don't live long enough to be cracked). LEAP may be configured to use TKIP instead of dynamic WEP.

https://en.wikipedia.org/wiki/Lightweight_Extensible_Authentication_Protocol

Wireless Application Protocol (WAP)

- is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web
browser for mobile devices such as mobile phones that uses the protocol. Introduced in 1999, WAP achieved some
popularity in the early 2000s, but by the 2010s it had been largely superseded by more modern standards. Most modern
handset internet browsers now fully support HTML, so they do not need to use WAP markup for web page compatibility,
and therefore, most are no longer able to render and display pages written in WML, WAP's markup language.

https://en.wikipedia.org/wiki/Wireless_Application_Protocol

Wired Equivalent Privacy (WEP) 128 AND 64

- is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in
1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable
by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely in use and was often the first security
choice presented to users by router configuration tools.

A 64-bit WEP key is usually entered as a string of 10 hexadecimal (base 16) characters (0–9 and A–F). Each character
represents 4 bits, 10 digits of 4 bits each gives 40 bits; adding the 24-bit IV produces the complete 64-bit WEP key (4 bits
× 10 + 24 bits IV = 64 bits of WEP key). Most devices also allow the user to enter the key as 5 ASCII characters (0–9, a–
z, A–Z), each of which is turned into 8 bits using the character's byte value in ASCII (8 bits × 5 + 24 bits IV = 64 bits of
WEP key); however, this restricts each byte to be a printable ASCII character, which is only a small fraction of possible
byte values, greatly reducing the space of possible keys.

A 128-bit WEP key is usually entered as a string of 26 hexadecimal characters. 26 digits of 4 bits each gives 104 bits;
adding the 24-bit IV produces the complete 128-bit WEP key (4 bits × 26 + 24 bits IV = 128 bits of WEP key). Most
devices also allow the user to enter it as 13 ASCII characters (8 bits × 13 + 24 bits IV = 128 bits of WEP key).

https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy

8. Research the ff:

A. File sharing and Steps in File sharing

Step 1: Create File - Create a file/folder on the desktop. Navigate to it via file explorer.
Step 2: Advanced Sharing - Right-click on the file, select properties. Click over to the "Sharing" tab and select advanced
sharing. Check the box marked "Share this folder".

Step 3: Permissions - Select which permissions you want other users to have for this file. You will retain full access, but
others will have either read-only, edit, or executable permissions, depending on what you select.

Step 4: Open Sharing - Go to control panel, select network & internet, then select network & sharing center. Go to
Advanced sharing settings. Scroll down, and select "Turn on sharing so anyone with network access can read and write
files in the Public folders" and "Turn off password protected sharing".

Step 5: Note - Ensure that you can connect to the other PC. Ping each other to see if you are both connected to the same
server.

Step 6: Accessing the File - On the 2nd PC, open file explorer. Go to network. Your file should be there.

https://www.instructables.com/id/File-Sharing/

B. Printer sharing and steps in printer sharing

In Windows 10, you can share your printer with many PCs on your network. To share a printer from the PC that the printer
is connected to (the primary PC) with secondary PCs that the printer is not connected to, you must set up sharing settings
for the printer, connect the printer to the primary PC (either wirelessly or by using a USB cable), and then turn on the
printer. Also make sure the primary PC is turned on, connected to the printer, and connected to the network.

 Share the printer on the primary PC

There are two ways to share your printer: using Settings or Control Panel.

 Share your printer using settings;


- Select the Start button, then select Settings > Devices > Printers & scanners.
- Choose the printer you want to share, then select Manage.
- Select Printer Properties, then choose the Sharing tab.
- On the Sharing tab, select Share this printer.
- If you want, edit the Share name of the printer. You'll use this name to connect to the printer from a secondary PC.
 Share your printer using Control Panel;
- In the search box on the taskbar, type control panel and then select Control Panel.
- Under Hardware and Sound, select View devices and printers.
- Select and hold (or right-click) the printer you want to share, select Printer properties, and then choose
the Sharing tab.
- On the Sharing tab, select Share this printer.
- If you want, edit the share name of the printer. You'll use this name to connect to the printer from a secondary PC.

 Connect the shared printer to another PC

There are two ways to connect a shared printer to another PC: using Settings or Control Panel.

 Connect a shared printer using Settings;


- Select the Start button, then select Settings > Devices > Printers & scanners.
- Under Add printers & scanners, select Add a printer or scanner.
- Choose the printer you want, and then select Add Device.

- If you don’t see the printer you want, select The printer that I want isn’t listed.
- In the Add printer dialog box, select Select a shared printer by name, and then enter the computer or device name
of the primary PC and the share name of the printer using one of these formats:

\\computername\printername

http://computername/printername/.printer
- When prompted to install the printer driver, select Next to complete the installation.

For more info about the computer or device name, see the Find your PC name section in this topic. By default, you need
the user name and password of the primary PC to access the printer.

 Connect a shared printer using Control Panel;


- In the search box on the taskbar, type control panel and then select Control Panel.
- Under Hardware and Sound, select View devices and printers, and then select Add a printer.
- Select the printer you want, select Next. When prompted, install the printer driver.
- If you don’t see the printer you want, select The printer that I want isn’t listed.
- In the Add a device dialog box, select Select a shared printer by name, and then enter the computer or device
name of the primary PC and the share name of the printer using one of these formats:

\\computername\printername

http://computername/printername/.printer

- When prompted to install the printer driver, select Next to complete the installation.

For more info about the computer or device name, see the Find your PC name section in this topic. By default, you need
the user name and password of the primary PC to access the printer.

 Set up Sharing settings

The settings you use to share devices is often turned on by default. If not, follow the steps in this section to turn settings
on using settings or Control Panel.

 Turn on sharing in Settings;


- Select the Start button, then select Settings > Network & Internet > Wi-Fi.
- Under Related settings, select Change advanced sharing options.
- In the Advanced sharing settings dialog box, expand the Private section. Next, under Network discovery,
select Turn on network discovery.
- Under File and printer sharing, select Turn on file and printer sharing.
 Turn on sharing in Control Panel;
- In the search box on the taskbar, type control panel and then select Control Panel.
- Select Network and Internet > Network and Sharing Center > Change advanced sharing settings.
- In the Advanced sharing settings dialog box, expand the Private section. Next, under Network discovery,
select Turn on network discovery.
- Under File and printer sharing, select Turn on file and printer sharing.

 Find your PC name

You’ll need the name of your primary PC, also called the computer name or device name, to connect the secondary PC to
the printer.

 Find your PC name in Settings;


- In the search box on the taskbar, type computer name.
- Select View your PC name.
- Under Device name, you’ll see the PC (computer) name.
 Find your PC name in Control Panel;
- In the search box on the taskbar, type control panel and then select Control Panel.
- Select System and Security > System > See the name of this computer.
- Under Computer name, you’ll see the PC (computer) name.

https://support.microsoft.com/en-ph/help/4089224/windows-10-share-network-printer

9. What is Accident Report Form and Technical Report on Test Conducted?


Accident Report is a form that is filled out in order to record details of an unusual event that occurs at the facility, such
as an injury to a patient. The purpose of the incident report is to document the exact details of the occurrence while they
are fresh in the minds of those who witnessed the event. This information may be useful in the future when dealing with
liability issues stemming from the incident.

https://en.wikipedia.org/wiki/Incident_report

Technical report is a document that describes the process, progress, or results of technical or scientific research or the
state of a technical or scientific research problem. It might also include recommendations and conclusions of the research.
Unlike other scientific literature, such as scientific journals and the proceedings of some academic conferences, technical
reports rarely undergo comprehensive independent peer review before publication. They may be considered as grey
literature. Where there is a review process, it is often limited to within the originating organization. Similarly, there are no
formal publishing procedures for such reports, except where established locally.

https://en.wikipedia.org/wiki/Technical_report

10. Create your own Anti Virus Software and Explain your work.

11.USING THE INTERNET ,RESEARCH TWO DIFFERENT HARDWARE FIRE WALLS.BASED ON YOUR
RESEARCH ,COMPLETE THE TABLE BELOW.

COMPANY WEBSITE URL COST SUBSCRIPTION LENGTH HARDWARE


/HARDWARE NAME (MONTH/YEAR/LIFETIME) FEATURE
12.WHICH HARDWARE FIREWALL WOULD YOU PURCHASE?LIST REASONS FOR YOUR CHOICE

13. .USING THE INTERNET ,RESEARCH TWO DIFFERENT HARDWARE FIRE WALLS.BASED ON YOUR
RESEARCH ,COMPLETE THE TABLE BELOW.

COMPANY WEBSITE URL COST SUBSCRIPTION LENGTH HARDWARE FEATURE


/HARDWARE NAME (MONTH/YEAR/LIFETIME)

Das könnte Ihnen auch gefallen