3 hours 20 minutes
everyone. My name is Peter Sip alone, and this is the network security course.
This is going to be module five. Lesson one
per requisites for this course are pretty much all of the informational modules. That's modules one through four module, one being the introduction module to being the core cybersecurity principles. Module three Being select applications
and Module four was all about network structured apologies, principles and protocols.
In this lesson, we are going to take a look at the basics of malware, user awareness, cybersecurity, training and security products. Now this is the application design section of the network security pyramid. So we're going to take a look Maura and hands on things, actual applications and devices
that are in the network on the network and
really good tips and tricks really to
protect yourself when on the network.
So the first off we have to make some things clear with malware. Malware is an all encompassing term, and it's like the same thing is virus. Everything is a virus. When a reality that's not exactly true. There are actually several different types, their families of malware, and it's important to know the difference. The first is actually a virus
on this is malicious software that infects a host file in order to spread.
That means it can't really do anything on its own, needs some sort of file, usually like a word document or execute herbal. And then it feeds off of that so kind of lives off some program that already exists.
There is the logic bomb, which executes when certain conditions are met. So this could be like a virus or some type of execute herbal that can run when conditions are met.
The conditions are usually things such as dating time. So if we have a virus that set for December 25th Christmas at 9 a.m. You know when that date and time arrives, the this virus will execute. Er this execute herbal will happen.
There is the worm, which is malicious software that clones itself in order to spread. So worms are standalone applications that don't need any other programs that kind of self encompassing in themselves. And when they want to spread across the network from computer to computer, they just simply make a copy of themselves.
There is the Trojan, which is software that masquerades is something it is not. This is like the Trojan wars on the Greeks, where, you know, you think you think you're you think you have something or you think you're opening something, but in reality, it's not what you think it is.
There is the baht, which is malicious code that acts like a remotely controlled robot. So this is used a lot in DDOS attacks. These are a little cooed that make the computer or whatever, do whatever you wanted to do. Essentially ah, bunch these bots together When they perform. DDOS attacks
are known as a botnet,
and they're usually controlled by a person or persons that are known as the baht masters.
And finally, there is the root kit. This is software that enables administrator control off a computer. These are very hard to spot, and basically, obviously, if you have administrator control, you can do pretty much whatever you want.
So the best countermeasures for malware is for humans. It's user awareness that is, that we humans, by far are the weakest point off network security. Unfortunately, so if you want to beef it up, you have to train your users. You have to make them aware
you have to make them know what they're looking at
the most, the most the time. People have no idea what they're looking at, so they start clicking on things. And then the next thing you know, you know
something happens. So
bottom here on these two pictures are an example off a phishing email and a link that's not a link at all. So
the first off is the phishing email. This is what a typical phishing email looks like. This is a phishing email that came from the wild. Most the time phishing emails will come in the amount of invoices, or they try to get you to have a quick reaction or response in order to do something.
So, as you can see from this phishing email
says, dear customer
generic. But okay, here's the invoice. This for this amount of money. This is due on October 2nd 2018. Right? So the whole point of this email is, too,
have emergency reaction of response. So if you can see from the date up at the top left, it's It was sent on September 28th and the invoices do
That means there's four days four days to pay the invoice. So this is so the whole point of this email is to have someone panic like, Oh, my gosh, We didn't pay this invoice. You know, we got it. We got to do this right now. Drop everything. Do this right now.
That's the whole point of this phishing email.
The second picture on the right is the link where you think it's a safe link when in reality, it's not safe at all. Thankfully, in order to determine whether Link is safe or not, you could hover over the link and you can see where it actually goes so you can take your mouse and kind of hover over it,
and a little window pops up showing you where the link
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered