Preview

Nt1310 Unit 3 Essay

Better Essays
Open Document
Open Document
1872 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Essay
1. What are the major security threats on my network and computers connected to the network?
There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.
2. What types of viruses do I should be aware of?
A boot-sector virus is a
…show more content…
A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.
10. How do firewalls protect my computer from hackers?
A firewall restricts access to your network by filtering and blocking packets based on the sender's and receiver's Internet Protocol addresses. A proxy firewall acts as an intermediary between a client and a server, and it retrieves information and sends to the client. A proxy firewall uses stateful inspection technology to monitor incoming information and restricts network packets through the firewall. A firewall uses network address translation or NAT to assign IP addresses to each device which is connected to your network and makes it harder for hackers to break the network security.
11. How can I create and manage my passwords to protect my

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted and at the receiver, the two signals are demodulated, and the results combined to produce the original binary input.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called “levels”. These levels map loosely to the Open Systems Interconnect (OSI) 7 layer model defined by the international standards organisation .…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1210 Lab 3.1 Essay

    • 453 Words
    • 2 Pages

    At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Essay

    • 437 Words
    • 2 Pages

    Case - A case is a sort of chassis for the internals of a computer and acts as a kind of protection from dust etc. It is also more appealing to look at rather than the internals of the computer.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Essay

    • 604 Words
    • 3 Pages

    I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time, every time or this is bad news for the company because of loss profits, scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 4 Essay

    • 1197 Words
    • 5 Pages

    Complete the necessary documentation relating to customer problems and solutions Unit 2.4Describe the types of information customers require in Resort Unit 2 2.1…

    • 1197 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    5) Firewall: A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Unit 8 eCommerce P1

    • 1328 Words
    • 6 Pages

    Firewall: A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.…

    • 1328 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet Safety

    • 758 Words
    • 4 Pages

    As technology improves, more and more people begin to play with computers, exploring the possibilities. As the people become more and more curious to what the limits are with computers, they begin to break those rules and steal information from other computers on the internet. There are many things that a computer hacker can get from your computer, and the same amount of answers to avoid these situations. Some of these hackers can get personal information off of your computer such as phone numbers, full names, credit card numbers, home addresses, personal letters, and much, much more. To avoid this many things can be done. First, you can store all the personal information, not wanted to be accessed by unknown eyes, on a separate floppy disk or other storage object you might have. You can also buy a firewall from your local computer store to allow you to choose who does and does not access your computer.…

    • 758 Words
    • 4 Pages
    Good Essays
  • Good Essays

    firewall

    • 1124 Words
    • 5 Pages

    Traditionally, a firewall is defined as any device (or software) used to filter or control the flow of traffic. Firewalls are typically implemented on the network perimeter, and function by defining trusted and untrusted zones…

    • 1124 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Firewalls

    • 964 Words
    • 4 Pages

    A firewall is a device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules.…

    • 964 Words
    • 4 Pages
    Good Essays

Related Topics