Preview

unit 7 lab 10

Good Essays
Open Document
Open Document
595 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 7 lab 10
NT1110

Lab 7

Task 1: Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside to the internal network. Hardware firewalls can protect computers on a local area network and they can be implemented without much configuration difficulty.

Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.
Task 2:
1. The companies that provide free trial versions of their software are Norton, McAfee, Panda, AVG, and Kaspersky. The companies who have free software versions are Panda, McAfee, and AVG.
2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.
Task 3:
1. Full backup is a complete backup of everything you want to backup. Differential backup software looks at which files have changed since you last did a full backup. Then creates copies of all the files that are different from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Most if not all businesses, schools and big companies regularly use computer systems and go on the internet they usually have many computer systems networked together that get used for important information and keep their companies running. This is why they install firewalls on their systems. Without firewalls there is the risk of malicious viruses getting through, infecting the system and sometimes taking it down completely. The firewall acts as a communications filter which stops those malicious communications from reaching the computer system. Firewalls can also be programmed to only visit certain sites this will make sure that there is no chance of a virus. Firewalls definitely improve the performance of computer systems.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the network policy.…

    • 1503 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    It has a range of products available to cover different needs, from premium services to businesses and basic antivirus software for home use. The most popular products from the security retailer include the following:…

    • 964 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Firewalls aim to provide organisations with reliable security at the network perimeter; however each firewall must be properly configured in order to allow and disallow network traffic accordingly, in a manner sensitive to business needs. Poorly configured firewalls can be overwhelmingly damaging to the security of an organisation – lax ingress rules may provide multiple vectors to attackers on the Internet, while lax egress rules may provide avenues for unauthorised command and control connections from the Internet and exfiltration of intellectual property and confidential data. Other factors must also be considered as part of a firewall configuration review, i.e. The software/firmware versions need to be identified in order to correlate with any publicly known issues or exploits with the specific device and version The network services available on the firewall also demand investigation and review against documented business requirements, including the number of registered users on the firewall and the password policies governing access to the device. IRM’s firewall configuration review provides an unbiased assessment of an organisation’s firewall deployments and the traffic that is currently permitted and denied through the organisation’s networks. The firewall configuration is validated against best practices in order to identify any misconfiguration that could lead to unauthorised and undesired access.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Threats come many shapes and forms such as Worms, Trojans and Viruses which generically get added to your system by clicking on an email attachment or downloaded from an untrusted site, which may contain malicious files.…

    • 1240 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Overview of Firewalls

    • 1576 Words
    • 7 Pages

    • Packet filter firewalls are less secure than application level firewalls because the packet filtering firewalls do not understand application layer protocols.…

    • 1576 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    A firewall controls network traffic, allowing or blocking it according to rules you specify (rather like a doorman at a nightclub, with rules on who to allow entry to). This can either be a special program running on your computer ("software firewall") or a separate box connected between your computer and the Internet ("hardware or firmware firewall").…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    firewall

    • 1124 Words
    • 5 Pages

    Traditionally, a firewall is defined as any device (or software) used to filter or control the flow of traffic. Firewalls are typically implemented on the network perimeter, and function by defining trusted and untrusted zones…

    • 1124 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Antivirus software must be carefully crafted to eliminate various types of malicious logic programs, including viruses, worms and Trojan horses. A virus is a program written to attach to a file or another program. Once it has infected that file or program, the virus can travel with it between computers. Typically, a virus can only infect a computer when the file it has infected is opened or the program is run. Worms are another type of malicious logic program that affects computer systems. A worm also travels between computers by attaching to files or programs, but can spread even if the user does not open or access the infected file. A Trojan horse is a software program disguised as a useful type of program that will damage a system once loaded.…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Data Security

    • 1962 Words
    • 8 Pages

    Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion.…

    • 1962 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Choosing Firewall

    • 902 Words
    • 4 Pages

    There are different types of firewall products available in the market and we have to choose the best that suits for our PC needs. Below are some of the firewalls and their features.…

    • 902 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Firewalls are network security tools that operate between the connection of an organization’s internal and the…

    • 2268 Words
    • 7 Pages
    Good Essays
  • Good Essays

    FIREWALL – A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to Internet especially Intranets. All messages entering or leaving the Intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I Am Who I Am

    • 339 Words
    • 2 Pages

    What do you think motivates a hacker to attempt to break into computers to probe their defenses?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays

Related Topics