NetworkSecurity_Jul21_06

NetworkSecurity_Jul21_06 - Network Security Demo: Web...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Network Security Demo: Web browser
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Email Messages 9 An email message can be instantly forwarded around the globe , even if accidentally. Do not write anything in a message that you will later regret! Read over the message before you send it! 9 Email messages can carry dangerous attachments . Do not open any file attached to a message unless you are absolutely certain of the sender of the message and the safety of the attachment. Best rule: Don’t open it unless you were expecting it.
Background image of page 2
9 Viruses and trojan horses are programs designed to replicate themselves as they pass from computer to computer - and usually do harm! 9 They are usually passed by a user opening an infected attachment. Don’t do that! 9 You should have a good antivirus program on your home computer and keep it up-to-date on the latest viruses. 9 You can run the University’s antivirus program to check your home directory and floppy disks for viruses, and to disinfect them if some are found.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Viruses & Trojan Horses (cont’d) 9 Real viruses are reported at a number of sites: Symantec.com – Viruses & Risks http://www.symantec.com McAfee.com – Threat Center http://www.mcafee.com
Background image of page 4
Hoax Viruses 9 Hoax virus warnings are frequently sent by email, and unknowing users forward them to all of their friends. Two known factors make a successful virus hoax: (1) technical sounding language
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

NetworkSecurity_Jul21_06 - Network Security Demo: Web...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online