Preview

I Am Who I Am

Satisfactory Essays
Open Document
Open Document
339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
I Am Who I Am
Manucum, Marvin John E. Group 5
N-116 Assignment # 5
Source: http://www.networkcomputing.com/wan-security/stupid-firewall-tricks.php

Question:

How can installation of firewall give an organization a false sense of security?

Answer:

Firewalls can be one of the most effective ways of protecting your security from any kind of harmful attacks; in short it is a form of a computer security. But they need to be configured properly the hardware and software of a firewall, by someone that can handle the program and have learned the specific task and knowledge both of the network and of computer security in general. Too many large organizations will buy a firewall, have it installed, and leave it at that. They feel that just because the firewall is there, they are already safe, some instances may arrive if the user does not get updated due to laziness/ignorance, they did not actually secure the machine, they only attempts to block access to exploitable services, the firewall misinterprets network traffic and suggests attacks for marketing purposes rather than for defense; these may cause the firewall to be malfunctioned.
Manucum, Marvin John E. Group 5
N-116 Assignment # 5
Source: http://www.geekwithlaptop.com/what-motivates-a-computer-criminal

Question:

What do you think motivates a hacker to attempt to break into computers to probe their defenses?

Answer:

They wanted to know if they could do it, they wanted to test your security if they couldn’t break it easily, they breaks security for non-malicious reasons, for instance testing their own security system, computer security consulting firms who is used to bug test a system prior to its launch, they are looking for exploits so they can be closed, they will surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, then they will offer to repair their system for a small fee, breaks into

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Most if not all businesses, schools and big companies regularly use computer systems and go on the internet they usually have many computer systems networked together that get used for important information and keep their companies running. This is why they install firewalls on their systems. Without firewalls there is the risk of malicious viruses getting through, infecting the system and sometimes taking it down completely. The firewall acts as a communications filter which stops those malicious communications from reaching the computer system. Firewalls can also be programmed to only visit certain sites this will make sure that there is no chance of a virus. Firewalls definitely improve the performance of computer systems.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    My firewall may be effective at blocking some attacks and offering a certain amount of protection. But a firewall does not guarantee that your computer will be attacked. In particular, a firewall offers little to no protection against viruses. However using a firewall in conjunction with other protective software and safe practices will strengthen resistance to attacks. Anti-virus software details vary between packages but basically it scans files on your computer’s memory for certain patterns that may indicate an infection, looking for signatures, or definitions, of known viruses. Authors for viruses are continually being updated and released, so it’s important you have the latest definitions installed so the software can tackle any threat new or old. Each virus software has its own method of response once it locates a virus, and the action may vary according to when it finds the virus either during an automatic or a manual scan. Most software produces a dialog box alerting you if it has found a virus and asks whether you want it to clean the file or remove it. Some software may attempt to remove the virus without first asking. A good user should familiarize themselves with the features so they know how to handle such a…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Firewalls are a combination of software and hardware that prevent unauthorized users from entering private networks. Controls the flow of incoming and outgoing network traffic. It is the gatekeeper that examine the credentials of the user before allowing access to the network. Can deter but not completely prevent intruders.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    LAB 7 Security Basics

    • 1023 Words
    • 3 Pages

    Security: A firewall with its own operating system is less prone for attacks. This in turn reduces the security risk and in addition, hardware firewalls have enhanced security controls.…

    • 1023 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    Data Breach

    • 2467 Words
    • 10 Pages

    People can’t help to wonder why the hackers would like to take them as target. The document of 2013 Data Breach Investigations Report says there’s almost 75% of the attacks are opportunistic, which means those attacks were not aim at a specific individual organization or a company, but the huge majority of those are basically financially motivated.…

    • 2467 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    War Driving Attack

    • 4214 Words
    • 17 Pages

    The organisational security is locked down. No more false alarms at 4:00am, of an impending internet intrusion. Thanks to a well-configured firewall, you 're stopping a large percentage of the causes of network breaches -- but despite the organisational security precautions. The problem is not with your firewall, these network-level security devices are designed for perimeter protection, and by definition they cannot stop attacks that originate inside your network!…

    • 4214 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Anthany Nilhas RN IU315

    • 533 Words
    • 2 Pages

    Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Why I Am Me

    • 257 Words
    • 2 Pages

    (to be completed by the contact person for the organization at the time service is performed)…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nowaday, hacker is someone makes the technology's life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we can't negate they don't have any influence on the development of technology. Hiring known hackers to test the security of a system is an example of this idea.…

    • 923 Words
    • 4 Pages
    Good Essays

Related Topics