* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download File
Survey
Document related concepts
Citizen Lab wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Trusted Computing wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Microsoft Security Essentials wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer virus wikipedia , lookup
Cyberwarfare wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Computer security wikipedia , lookup
Unix security wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
Antivirus software wikipedia , lookup
Transcript
Articles/Websites Assignment: 1. Keeping Information Secure and Confidential (Firewalls) Summary: Usually, the word firewall refers to a wall, that is used protect something or someone from a fire. However, in the world of computer and technology it refers to as type of system tool that enables particular types of system traffics. Therefore, it forms a barrier between a faithful and an unfaithful network. Firewalls can be organized into two different categories. One which is a defaultdeny policy, where the firewall system lists down allowed system services, and everything else is rejected. The second category is a default- allow policy, which were the firewall system lists system services that are not allowed, but everything else is accepted by the network. In addition, there many types of firewalls such as Packet filtering firewall, Stateful firewall, Deep packet inspection firewall, Application proxy firewall, Application- aware firewall and more, one better than the other. However, there all made to help people with their computer problems. 2. Privacy and Security issue (Cyber Stalking) Summary: Cyber stalking is a very a big issue that not many people understand, and what we don’t know is that 1 out of every 10 people is very muck likely to be the prey of one of these stalkers, which also means me and you. That is why people are organizing campaigns for awareness of Internet safety. As a result the preys of these stalkers are faced with problems and effects such as psychological trauma. This is where it shows up in many types of formations, this includes paranoia, a complete nervous breakdown and more. This results in the change of behavior. Sometimes these changes are caused by real life danger to the victim and to his or her‘s loved ones. But where and how do you attract stalkers on the internet? Well you can pick up stalkers wherever you go on the internet to socialize; this includes chat rooms, email. However, not all stalkers start of with intentions to stalk someone, several become stalkers after they have been rejected by someone they liked. In addition, cyber stalking is an issue that people are trying to put a stop to. 3. The purpose and benefit/drawback of anti-virus software’s Summary: Anti-virus software is a type of system that helps protect the computer from viruses like keyloggers, and Trojan. The actual advantages of anti- virus software’s are the same to not having one. The web isn’t a very safe place, viruses are very well known attackers that can do various types of damage to the computer. Occasionally users are attacked by viruses are when they encounter unknown files, email scams, or when they visit scamming sites. Sometimes viruses even mess wit the user and pretend to even be a anti- virus software, and everyday hackers find new ways to corrupt computers. Like spyware and theft which is a type of virus that hackers use to spy on their in victim. And what people don’t know is that when they get spammed by various types of emails, they don’t know that it is caused by viruses. However, there are types of software that are well known and trusted by people that help against viruses like Webroot AntiVirus, Bit Defender Antivirus Plus, Kaspersky Anti-virus, and more. Resources: 1. Dell (2013). What is Firewall security? Retrieved from http://www.secureworks.com/resources/articles/other_articles/firewallsecruity 2. Jessica, D (2011-2012). The benefits of having Antivirus Protection. Retrieved from http://anti-virus-software-review.toptenreviews.com/thebenefits-of -having-anti-virus-protection.html 3. Paul Hook (2001). Cyber Stalkers. Retrieved from http://www.awardsites.com/articles/oir/cyber_stalkers.html