Download File

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Citizen Lab wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Trusted Computing wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Deep packet inspection wikipedia , lookup

Malware wikipedia , lookup

Hacker wikipedia , lookup

Computer virus wikipedia , lookup

Cyberwarfare wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Computer security wikipedia , lookup

Unix security wikipedia , lookup

Cybercrime wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Antivirus software wikipedia , lookup

Cyberattack wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
Articles/Websites Assignment:
1. Keeping Information Secure and Confidential (Firewalls)
Summary:
Usually, the word firewall refers to a wall, that is used protect something or
someone from a fire. However, in the world of computer and technology it refers
to as type of system tool that enables particular types of system traffics.
Therefore, it forms a barrier between a faithful and an unfaithful network.
Firewalls can be organized into two different categories. One which is a defaultdeny policy, where the firewall system lists down allowed system services, and
everything else is rejected.
The second category is a default- allow policy,
which were the firewall system lists system services that are not allowed, but
everything else is accepted by the network. In addition, there many types of
firewalls such as Packet filtering firewall, Stateful firewall, Deep packet
inspection firewall, Application proxy firewall, Application- aware firewall and
more, one better than the other. However, there all made to help people with
their computer problems.
2. Privacy and Security issue (Cyber Stalking)
Summary:
Cyber stalking is a very a big issue that not many people understand, and what
we don’t know is that 1 out of every 10 people is very muck likely to be the prey
of one of these stalkers, which also means me and you. That is why people are
organizing campaigns for awareness of Internet safety. As a result the preys of
these stalkers are faced with problems and effects such as psychological
trauma. This is where it shows up in many types of formations, this includes
paranoia, a complete nervous breakdown and more. This results in the change
of behavior. Sometimes these changes are caused by real life danger to the
victim and to his or her‘s loved ones. But where and how do you attract
stalkers on the internet? Well you can pick up stalkers wherever you go on the
internet to socialize; this includes chat rooms, email. However, not all stalkers
start of with intentions to stalk someone, several become stalkers after they
have been rejected by someone they liked. In addition, cyber stalking is an
issue that people are trying to put a stop to.
3. The purpose and benefit/drawback of anti-virus software’s
Summary:
Anti-virus software is a type of system that helps protect the computer from
viruses like keyloggers, and Trojan. The actual advantages of anti- virus
software’s are the same to not having one. The web isn’t a very safe place,
viruses are very well known attackers that can do various types of damage to
the computer. Occasionally users are attacked by viruses are when they
encounter unknown files, email scams, or when they visit scamming sites.
Sometimes viruses even mess wit the user and pretend to even be a anti- virus
software, and everyday hackers find new ways to corrupt computers. Like
spyware and theft which is a type of virus that hackers use to spy on their in
victim. And what people don’t know is that when they get spammed by various
types of emails, they don’t know that it is caused by viruses. However, there
are types of software that are well known and trusted by people that help
against viruses like Webroot AntiVirus, Bit Defender Antivirus Plus, Kaspersky
Anti-virus, and more.
Resources:
1. Dell (2013). What is Firewall security? Retrieved from
http://www.secureworks.com/resources/articles/other_articles/firewallsecruity
2. Jessica, D (2011-2012). The benefits of having Antivirus Protection.
Retrieved from http://anti-virus-software-review.toptenreviews.com/thebenefits-of -having-anti-virus-protection.html
3. Paul Hook (2001). Cyber Stalkers. Retrieved from
http://www.awardsites.com/articles/oir/cyber_stalkers.html