21
NETWORK VIRUS- PROTECTION AND PREVENTION Presented By: Anup Mahato Electronics & Communication Engineering

Network virus

Embed Size (px)

Citation preview

Page 1: Network virus

NETWORK VIRUS- PROTECTION AND PREVENTION

Presented By: Anup MahatoElectronics & Communication Engineering

Page 2: Network virus

ABOUT NETWORK VIRUS• What is a Network virus?• Types of Virus• Who are vulnerable?• How they spread? • Symptoms of attackPROTECTION AND PREVENTION• Host vs. Network-based antivirus• Firewall and its Function• Prevention• The steps in the virus removal process

Page 3: Network virus

INTRODUCTION• A network virus has the ability to quickly degrade

the performance of a network, totally disabling critical devices, programs and network connections.

• Once the infection spreads, fully eradicating it often

becomes difficult.

• Viruses that use network protocols to spread and infect other computers on a computer network are called worms.

Page 4: Network virus

TYPES OF NETWORK VIRUSES

• E-mail (and other application)

• Windows file sharing worms

• Traditional Network Virus

Page 5: Network virus

WHO ARE VULNERABLE?

• Financial institutions and banks• Internet service providers• Pharmaceutical companies• Government and defense agencies• Contractors to various government agencies• Multinational corporations• ANYONE ON THE NETWORK

Page 6: Network virus

HOW THEY SPREAD

• A network virus makes use of networking protocols and/or applications to spread.

• Network viruses make uses of system network mechanisms, search local and remote system information, monitor network traffic.

• Take advantage of system and network vulnerabilities, and build network connections.

Page 7: Network virus

Dept

B

University X

Location

A

Location

CLocation

B

Dept

A

Dept

B

Dept

C

Carrier NAP

Los Angeles

NAP

St. Louis

NAP

Dept

A

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Small Town U.S.A.

NAP

VIRUS/WORM/DATA SPREAD IN UNPROTECTED NETWORKS

Page 8: Network virus

Dept

B

University X

Location

A

Location

CLocation

B

Dept

A

Dept

B

Dept

C

Carrier NAP

Los Angeles

NAP

St. Louis

NAP

Dept

A

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Small Town U.S.A.

NAP

VIRUS/WORM/DATA SPREAD IN UNPROTECTED NETWORKS

Page 9: Network virus

Dept

B

University X

Location

A

Location

CLocation

B

Dept

A

Dept

B

Dept

C

Carrier NAP

Los Angeles

NAP

St. Louis

NAP

Dept

A

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Small Town U.S.A.

NAP

VIRUS/WORM/DATA SPREAD IN UNPROTECTED NETWORKS

Page 10: Network virus

Dept

B

University X

Location

A

Location

CLocation

B

Dept

A

Dept

B

Dept

C

Carrier NAP

Los Angeles

NAP

St. Louis

NAP

Dept

A

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Small Town U.S.A.

NAP

VIRUS/WORM/DATA SPREAD IN UNPROTECTED NETWORKS

Page 11: Network virus

Dept

B

University X

Location

A

Location

CLocation

B

Dept

A

Dept

B

Dept

C

Carrier NAP

Los Angeles

NAP

St. Louis

NAP

Dept

A

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Carrier NAP

Small Town U.S.A.

NAP

VIRUS/WORM/DATA CONTAINMENT IN PROTECTED NETWORKS

Page 12: Network virus

SYMPTOMS

• The computer fails to start • Programs will not launch or they fail when simple

commands are performed • Names of files are changing or become unreadable • File contents change or are no longer accessible • Unusual words or graphics appear on the screen • Hard or floppy disks are formatted • Variations occur in computer performance, such as

slowing down in loading or operation

Page 13: Network virus

PROTECTING A NETWORK

• Single-User Anti-Virus Software• Managed Anti-Virus Service• Enforced Network Anti-Virus• Server-based Anti-Virus• Firewall to provide external Network security

Page 14: Network virus

HOST-BASED VS. NETWORK-BASED ANTIVIRUS

Viruses enter an HAV (host-based antivirus) protected internal network

Page 15: Network virus

Using Network -based Antivirus Firewall to stop viruses at the network edge

Page 16: Network virus

FIREWALL

• A firewall is a combination of hardware components (such as routers, host computers, NIC cards) and appropriate software, that controls access between your private network (such as a LAN) and an external network (such as the Internet).

Page 17: Network virus

FUNCTIONS OF FIREWALL

• A firewall provides specific exit and entry points to your network for both external and internal users.

• We can also allow some external access from the Internet, but only to selected servers for sending email or accessing public corporate information.

• Thus it can stop intensive hacking techniques in network virus implementation.

Page 18: Network virus

WHAT WE CAN DO TO PREVENT A VIRUS ATTACK

The best cure for any virus is prevention.To avoid virus infection, weneed to do the following:

• Develop a Virus Protection Plan • Install Network-Based Anti-Virus and Firewall• Scan, Update, and Upgrade Automatically • Back Up Your Data Regularly • Consider Every Disk, Program, and Email Attachment as a Threat • Use Caution When You Download Files from the Internet • Be Aware of Virus Hoaxes• Block executables file attachments • Educate Your Network Users• Avoid using accounts with administrative privileges on an infected network. • Strong password on Shared Drives/folder• Keep all applications (including your operating system) patched.

Page 19: Network virus

THE STEPS IN THE VIRUS REMOVAL PROCESS

• Determine the type of virus• Isolate all infected systems and hard disks.• Make sure you have a clean hard disk drive

formatted as a system disk• Use the clean system disk to boot up all

systems with suspected infection• Scan every physical and logical hard disk, as

well every USB Drives.• Clean the infected server.

Page 20: Network virus

CONCLUSION• When it comes to virus attacks, knowledge is

the best possible weapon to prevent them.• Preventive measures should be taken before

viruses establish strong hold within a network.• For system administrators it is necessary to

develop a Virus protection Plan and install Network-based antivirus and Firewall.

• Establish a secure infrastructure for your network

Page 21: Network virus

THANK YOUSTAY PROTECTED