to Network Security:
Security plays very critical factor in almost every field either it is an
organization, a governmental entity, a country, or even your house. Computers, mobile devices, and Internet are also
facing surplus amount of network security challenges day by day.
far as the security risks in mobiles/ computers are concerned, virus attacks,
stealing of data, deletion of data and damage to hardware can be taken into
security is not only that blocking unauthorized access, denial of service to an
unauthorized user, but also includes the virus attack, hacking, trojans etc.
is a software designed by hackers to gain illegal access to software and cause
virus is a small piece of computer code that can repeat itself and spreads from
one computer to another by attaching itself to another computer file.
Worms are self- repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
can be installed on the computer automatically when the attachments are open,
by clicking on links or by downloading infected software.
A Trojan virus is a program that appears to perform one function (for example, virus removal) but actually performs hateful activity when executed.