NIS Chapter-1-Introduction and Security Trends Notes

Total Page:16

File Type:pdf, Size:1020Kb

NIS Chapter-1-Introduction and Security Trends Notes Chapter-1 : Computer Security – Gscheme -- 2017 Chapter-1 INTRODUCTION TO COMPUTER SECURITY AND SECURITY TRENDS Syllabus --- 22 Marks ---- 10 Hours Objectives: To understand CIA model. To identify the risks and threats. To understand security attacks. Contents : 1.1. Definition of Computer Security, Need for security, Security basics: Confidentiality, Integrity, Availability, Accountability, Non-repudiation. Example of Security, Challenges for security, Model for Security. 1.2. Risk and Threat Analysis: Assets, Vulnerability, Threats, Risks, Counter measures. 1.3. Threat to Security: Viruses and Worms, Intruders, Insiders , Criminal organizations, Terrorists, Information warfare Avenues of attack, steps in attack 1.4. Security attacks: Active and Passive attacks, Denial of service, backdoors and trapdoors, sniffing, spoofing, man in the middle, replay, TCP/IP Hacking, encryption attacks. 1.5. Malware : Viruses, Logic bombs Q.What is computer security means? Ans. Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior. Q.What is Data Security? Ans. Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data Security Technologies Disk Encryption Hardware based Mechanisms for Protecting Data Backups Data Masking Data Erasure 1 Chapter-1 : Computer Security – Gscheme -- 2017 Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer. Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures. The field of information security has grown and evolved significantly in recent years. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, to name a few, which are carried out by Information Security Consultants Q.What is Network Security ? In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. Network security concepts Network security starts from authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name, i.e. the password which is something you 'know', this is sometimes termed one factor authentication. With two factor authentication something you 'have' is also used (e.g. a security token or 'dongle', an ATM card, or your mobile phone), or with three factor authentication something you 'are' is also used (e.g. a fingerprint or retinal scan). 2 Chapter-1 : Computer Security – Gscheme -- 2017 Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the network may be logged for audit purposes and for later high level analysis. Communication between two hosts using a network could be encrypted to maintain privacy. Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis could be used to further tighten security of the actual network being protected by the honeypot. Q.What Does "Secure" Mean? Ans.How do we protect our most valuable assets? One option is to place them in a safe place, like a bank. We seldom hear of a bank robbery these days, even though it was once a fairly lucrative undertaking. Communications and transportation were primitive enough that it might have been hours before the legal authorities were informed of a robbery and days before they could actually arrive at the scene of the crime, by which time the robbers were long gone. To control the situation, a single guard for the night was only marginally effective. Should you have wanted to commit a robbery, you might have needed only a little common sense and perhaps several days to analyze the situation; you certainly did not require much sophisticated training. Indeed, you usually learned on the job, assisting other robbers in a form of apprenticeship. On balance, all these factors tipped very much in the favor of the criminal, so bank robbery was, for a time, considered to be a profitable business. Protecting assets was difficult and not always effective. Today, however, asset protection is easier, with many factors working against the potential criminal. Very sophisticated alarm and camera systems silently protect secure places like banks whether people are around or not. The techniques of criminal investigation have become so effective that a person can be identified by genetic material (DNA), fingerprints, retinal patterns, voice, a composite sketch, ballistics evidence, or other hard-to-mask characteristics. The assets are stored in a safer form. For instance, many bank branches now contain less cash than some large retail stores because much of a bank's business is conducted with checks, electronic transfers, credit cards, or debit cards. Sites that must store large amounts of cash or currency are protected with many levels of security: several layers of physical systems, complex locks, multiple-party systems requiring the agreement of several people to allow access, and other schemes. Significant improvements in transportation and communication mean that police can be at the scene of a crime in minutes; dispatchers can alert other officers in seconds 3 Chapter-1 : Computer Security – Gscheme -- 2017 about the suspects to watch for. From the criminal's point of view, the risk and required sophistication are so high that there are usually easier ways than bank robbery to make money. Q.Describe the term Interception , Interruption , Modification and Fabrication related to threats Ans. An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to
Recommended publications
  • A Comparative Analysis of Anti-Phishing Mechanisms: Email Phishing
    Volume 8, No. 3, March – April 2017 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info A Comparative Analysis of Anti-Phishing Mechanisms: Email Phishing ShwetaSankhwar and Dhirendra Pandey BabasahebBhimraoAmbedkar University Lucknow, U. P., India Abstract: Phishing has created a serious threat towards internet security. Phish e-mails are used chiefly to deceive confidential information of individual and organizations. Phishing e-mails entice naïve users and organizations to reveal confidential information such as, personal details, passwords, account numbers, credit card pins, etc. Phisher spread spoofed e-mails as coming from legitimate sources, phishers gain access to such sensitive information that eventually results in identity and financial losses.In this research paper,aexhaustive study is done on anti-phishing mechanism from year 2002 to 2014. A comparative analysis report of anti-phishing detection, prevention and protection mechanisms from last decade is listed. This comparativeanalysis reports the anti-phishing mechanism run on server side or client side and which vulnerable area is coverd by it. The vulnerable area is divided into three categories on the basis of email structure. The number of vulnerabilties covered by existing anti-phishing mechanisms are listed to identify the focus or unfocused vulnerability. This research paper could be said as tutorial of a existing anti-phishing research work from decade. The current work examines the effectiveness of the tools and techniques against email phishing. It aims to determine pitfalls and vulnerability of anti-phishing tools and techniques against email phishing. This work could improve the understanding of the security loopholes, the current solution space, and increase the accuracy or performance to counterfeit the phishing attack.
    [Show full text]
  • The Most Common Blunder People Make When the Topic of a Computer Virus Arises Is to Refer to a Worm Or Trojan Horse As a Virus
    Trojan And Email Forging 1) Introduction To Trojan&viruses: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.[1][2][3][4][5] A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).[7] A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download. The Difference Between a Computer Virus, Worm and Trojan Horse The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus.
    [Show full text]
  • How to Layer and Sell Security Solutions to Protect Your Clients’ Remote Workers, Data, and Devices
    How to Layer and Sell Security Solutions to Protect Your Clients’ Remote Workers, Data, and Devices PAX8 | PAX8.COM ©2021 Pax8 Inc. All rights reserved. Last updated April 2021. About This Guide This guide offers recommendations to build a layered remote security stack and position it to your clients to keep them productive and secure while working remotely. Introduction Shifting the Security Focus: From the Perimeter to Endpoints 2 Building the Foundation for Remote Security 1. Put Endpoint Security in Place 3 2. Layer on Additional Email Security 4 3. Begin Ongoing End User Security Training 5 Standardizing Your Remote Security Stack: Trending Solutions 6 Fortifying Remote Defenses Other Tools to Secure Remote Work Environments 7 Advancing the Conversation Remote Security Checklist 8 Email Template for Layered Security 9 Education, Enablement & Professional Services Your Expert for Secure Remote Work 10 [email protected] | +1 (855) 884-7298 | pax8.com INTRODUCTION A Shift in Security Focus: While the global spike in remote work in 2020 helped many companies stay productive, it also increased security challenges as employees remotely accessed company networks, of remote workers say files, and data. With more employees working outside their biggest challenge of the safety of perimeter security related to the is collaboration and corporate network and firewalls, IT security focus communication1 shifted to endpoints, email, and end users as the first line of defense. A Wave of COVID-19 Related Cyber Risks: The surge in remote work due to COVID-19 (and the resulting security vulnerabilities) fueled an alarming rise in cybercrime – the FBI reported in August 2020 that cyberattack complaints were up by 400%!2 Microsoft reported that pandemic-themed phishing and social engineering attacks jumped by 10,000 a day, while cybersecurity experts reported that ransomware attacks were up by 800%.
    [Show full text]
  • Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans
    Cleveland State University EngagedScholarship@CSU ETD Archive 2008 Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans Sinchai Caravut Cleveland State University Follow this and additional works at: https://engagedscholarship.csuohio.edu/etdarchive Part of the Computer Sciences Commons How does access to this work benefit ou?y Let us know! Recommended Citation Caravut, Sinchai, "Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans" (2008). ETD Archive. 546. https://engagedscholarship.csuohio.edu/etdarchive/546 This Thesis is brought to you for free and open access by EngagedScholarship@CSU. It has been accepted for inclusion in ETD Archive by an authorized administrator of EngagedScholarship@CSU. For more information, please contact [email protected]. MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS SINCHAI CARAVUT Bachelor of Engineering in Computer Engineering King Mongkut’s Institute of Technology Ladkrabang May, 2001 submitted in partial fulfillment of requirement for degree MASTER OF COMPUTER AND INFORMATION SCIENCE at the CLEVELAND STATE UNIVERSITY May, 2008 This thesis has been approved for the Department of Computer and Information Science and the College of Graduate Studies by ______________________________________ Dr. Chien-Hua (Mike) Lin _______________________ Department & Date ______________________________________ Dr. Barbara A. Benander _______________________ Department & Date ______________________________________ Dr. Victor Matos _______________________ Department & Date MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS SINCHAI CARAVUT ABSTRACT Trojan horses commonly known as “Trojans” are the computer threats that have been recently causing trouble on the internet because of their new propagation techniques. Social engineering has become a popular strategy to deceive people to run the attacker’s malicious programs. Trojans use this technique to propagate themselves from a computer or a network to others, thus making them hard to prevent.
    [Show full text]
  • CHUENCHUJIT-THESIS-2016.Pdf
    c 2016 Thasphon Chuenchujit A TAXONOMY OF PHISHING RESEARCH BY THASPHON CHUENCHUJIT THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2016 Urbana, Illinois Adviser: Associate Professor Michael Bailey ABSTRACT Phishing is a widespread threat that has attracted a lot of attention from the security community. A significant amount of research has focused on designing automated mitigation techniques. However, these techniques have largely only proven successful at catching previously witnessed phishing cam- paigns. Characteristics of phishing emails and web pages were thoroughly analyzed, but not enough emphasis was put on exploring alternate attack vectors. Novel education approaches were shown to be effective at teach- ing users to recognize phishing attacks and are adaptable to other kinds of threats. In this thesis, we explore a large amount of existing literature on phishing and present a comprehensive taxonomy of the current state of phish- ing research. With our extensive literature review, we will illuminate both areas of phishing research we believe will prove fruitful and areas that seem to be oversaturated. ii In memory of Nunta Hotrakitya. iii ACKNOWLEDGMENTS I would like to express my deepest gratitute to Professor Michael Bailey for guiding this work from start to finish. I also greatly appreciate the essential assistance given by Joshua Mason and Zane Ma. Finally, I wish to thank my parents for their love and support throughout my life. iv TABLE OF CONTENTS CHAPTER 1 INTRODUCTION . 1 CHAPTER 2 RELATED WORK . 3 CHAPTER 3 ATTACK CHARACTERISTICS .
    [Show full text]
  • Utilising the Concept of Human-As-A-Security-Sensor for Detecting Semantic Social Engineering Attacks
    Utilising the concept of Human-as-a-Security-Sensor for detecting semantic social engineering attacks Ryan John Heartfield A thesis submitted in partial fulfilment of the requirements of the University of Greenwich for the Degree of Doctor of Philosophy DOCTOR OF PHILOSOPHY June 2017 Declaration \I certify that the work contained in this thesis, or any part of it, has not been accepted in substance for any previous degree awarded to me, and is not concurrently being submitted for any degree other than that of Doctor of Philosophy being studied at the University of Greenwich. I also declare that this work is the result of my own investigations, except where otherwise identified by references and that the contents are not the outcome of any form of research misconduct." SUPERVISOR: ................................................ ............................... RYAN HEARTFIELD SUPERVISOR: ................................................ ............................... DR. GEORGE LOUKAS SUPERVISOR: ................................................ ............................... DR. DIANE GAN i Abstract Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strate- gies to psychologically manipulate a user. Semantic attacks are the spe- cific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Semantic social engineering
    [Show full text]
  • Blocking Unwanted Rdp Requests
    Blocking Unwanted Rdp Requests Supposable Hillery reel or deafen some grockles categorically, however low-lying Mic riddled cogently or map. Stunned Drew outvoices: he described his currents neither and next. Waring remains geographic after Adam query austerely or convulsed any streamlets. Remote Desktop Protocol Vulnerability. You will be prompted to enter the password for the username you specified earlier. Clear view of password access and audit traces. There is a progress window display. What is the Internode Network Firewall? You must not disable the Workstation service on computers that are members of an Active Directory domain or they will no longer apply group policy. My next step is to roll back to a previous date, we recommend you do not use the Least Connections load balancing method. Resolution and choose a lower value. All traffic is first checked against Firewall Rules before being analyzed by the stateful inspection engine. Cracking is easier than ever now. Click the Start button. SEB on Windows checks some Windows flag which indicates that the display data is streamed over a remote connection. Tools menu: Disable Internet Options. PC, be aware that any changes you make to the monitor in the other Application Service will apply to this Application Service as well. Not all traffic communicating on a given port is what it appears to be. The Scope step of the wizard allows you to input local and remote IP addresses whose network traffic applies to the current rule. Deny all sessions originating from the WAN to the DMZ. If a need then request assistance from staff person click select Remote Control.
    [Show full text]
  • Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc
    Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc. “ Syngress: The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. Unique Passcode 28475016 PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
    [Show full text]
  • Cybergenerations Facilitator Guide
    CyberGenerations Workshop Facilitator Guide This document provides instructions to Facilitators on how to effectively deliver a CyberGenerations workshop. It informs Facilitators how to prepare, what to prepare, and what to say and do to facilitate the lessons effectively. About this Workshop Table of Contents Table of Contents .................................................................................................................... 2 About this Workshop .............................................................................................................. 4 Workshop Overview.............................................................................................................. 4 Workshop Outline ................................................................................................................. 5 Preparation Notes for Facilitators ......................................................................................... 6 Advance Preparation for Facilitators .................................................................................... 6 Facilitator Resources ............................................................................................................ 7 Participant Resources........................................................................................................... 7 Facilitation Instructions .......................................................................................................... 8 Topic 1: Welcome (10 min.).................................................................................................
    [Show full text]
  • A Review on Phishing Website Detection Using Machine Learning
    JOURNAL OF CRITICAL REVIEWS ISSN- 2394-5125 VOL 7, ISSUE 19, 2020 A REVIEW ON PHISHING WEBSITE DETECTION USING MACHINE LEARNING Sudha M1, Jaanavi R V2, Blessy Ida Gladys S3, Priyadharshini4 1,2,3,4,School of Information Technology & Engineering,Vellore Institute of Technology - Vellore Campus, India. E mail: [email protected] Received: May 2020 Revised and Accepted: August 2020 ABSTRACT: Fraudulent communication in the internet is an ever growing issue in the cyber world. This article reviews the negative impacts of fraudulent sites referred as Spoofed websites or phishing websites. These spoofed-sites attempts to steal the essential credentials of any individual by means of false websites that appears same as the original website in the cyber space. Any legitimate user in the Internet communication may prompt to use these spoofed-sites by mistyping the web-address. On the other side when an individual attempts to get his site using a browser cache directly instead of typing the site address on own would lead to these type of spoofed web logging. It is severe issue, as it leads to fiscal losses for both industries and individuals. Therefore this article endeavor to investigate the applicability of widely adopted machine learning model for predicting the Spoofed websites. The proposed algorithm is used to identify and characterize the rules and factors required to classify the spoofed websites. Further these classification techniques are used to identify the relationship between rules and factors to correlate them with each other so as to detect the performance, accuracy, number of rules generated and speed. A Divide and conquer approach is applied in this assessment to detect the spoofed websites.
    [Show full text]
  • Session Hijacking. – Stealing of Session ID/Cookies Allows an Attacker to Impersonate an Ongoing Session – Replay of a Session to Repeat Some Important Action
    Computer System- B Security Introduction to Web Security P2 Cookies, session IDs, Phishing (URL obfuscation) Sanjay Rawat HTTP vs HTTPS ● HTTP send request/response in clear text – Information can be sniffed (confidentiality is lost) ● We do not know if we are connected to the right server – Identity/authenticity is not variable. ● HTTPS (secure) solves this by using crypto. – Encryption – Signature – MAC ● Example: SSL/TSL (later in the unit) HTTP is stateless HTTP is stateless ● The notion of a session – encapsulates information about a visitor – Allows user to relate multiple requests HTTP is stateless ● The notion of a session – encapsulates information about a visitor – Allows user to relate multiple requests ● Session information should be considered extremely sensitive HTTP is stateless ● The notion of a session – encapsulates information about a visitor – Allows user to relate multiple requests ● Session information should be considered extremely sensitive ● Thus, a class of attacks known as session hijacking Sessions Using GET or POST Sessions Using GET or POST ● Pass session information to the web server each time the user navigates to a new page using GET or POST requests. Sessions Using GET or POST ● Pass session information to the web server each time the user navigates to a new page using GET or POST requests. ● This method is particularly susceptible to man-in-the- middle attacks, unfortunately, since HTTP requests are unencrypted. Sessions Using GET or POST ● Pass session information to the web server each time the user navigates to a new page using GET or POST requests. ● This method is particularly susceptible to man-in-the- middle attacks, unfortunately, since HTTP requests are unencrypted.
    [Show full text]
  • Experimental Analysis of Trojan Horse and Worm Attacks in Windows Environment
    Journal of Advanced Research in Computing and Applications 13, Issue 1 (2018) 1-9 Journal of Advanced Research in Penerbit Akademia Baru Computing and Applications Journal homepage: www.akademiabaru.com/arca.html ISSN: 2462-1927 Experimental Analysis of Trojan Horse and Worm Attacks in Open Windows Environment Access 1, ∗ 2 Abidah Mat Taib , Nurul Nabila Khairu Azman Azman 1 Department of Computer Science, Faculty of Computer and Mathematical Sciences Universiti Teknologi MARA, 40450 Shah Alam, Mal aysia 2 Faculty of Education, Universiti Teknologi MARA, 40450 Shah Alam, Malaysia ARTICLE INFO ABSTRACT Trojan Horse is the most powerful malware that can produce an attack to penetrate Article history: into the network environment. Besides Trojan, another harmful malware known as Received 5 March 2018 Received in revised form 12 April 2018 Worm also can cause enormous damage to the computer system. Unfortunately, some Accepted 10 July 2018 users do not concern much on security because they thought there is not much Available online 4 August 2018 valuable information can be obtained from them. The lack of awareness about computer and network security as well as misunderstanding of how malware attacks can occur, resulted in these users do not realize that their machines are at risk and they are exposed to several kind of potential cyber threats. Thus, this paper provides an insight on network vulnerability and presents some demonstrations of Remote Access Trojan (RAT) attack and worm file duplication attack via experimental tesbed. Then, Wireshark and some malware scanning tools such as Virus Total, MalwareBytes and Avast AntiVirus were also used for malware detection.
    [Show full text]