Free Essay

Tb143 Lab 7 Security Basic

In:

Submitted By chrisng978
Words 687
Pages 3
Task 1: Firewall is software or hardware based network security system to protect between your computer network and the internet. Hardware firewalls are best suited to business and large networks, whereas Software firewalls are best suited for home use. Hardware firewalls is a small metal box so one could hook up to a computer network just like if you were to add a printer etc. Software firewalls gives you a level of protections from hackers and unwanted intrusions. Software firewalls packages has anti spam, antivirus, even anti-popup ads. There are also parental controls to manage what or certain websites your minor can visit.
Barracuda Firewall is the newest Hardware. It has email, web, and network security. Barracuda provides intrusion prevention, virus scanning, content filtering, and reporting. Barracuda Firewall is perfect fit for small and medium sized businesses.
Zone Alarm protect your PC from viruses and spyware, also has internet firewall, internet browser security and theft prevention, and email virus scan. This is example of a software firewall, great for home use.
Task 2: Avg, and Panda offer Free anti-virus programs to protect your computer. Norton and Kaspersky offer trial run versions for a number of months then thereafter one could purchase the anti-virus program. Trojan horse programs is a type of file converters, but also it could install harmful programs such as spyware and rootkits. Malicious email attachments are a way for a sender to transmit files to another email user, in other words its junk mail. Email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious websites or have attachments containing malicious software. Drive by downloads could mean two things a person authorized but without understanding the consequences or any downloads that happens without a person knowledge.
Task 3: Full backup are backed up every time you use the files or folders on the drive. A disadvantage to this would take up more time and require more disks or drive space. Incremental backup provide backup of files that have changed or new since the last backup. Similar to full backup, but only if the same file set to perform a incremental backup will backup if there are any changes. Backup time is faster than full backup and you can keep several versions of the same files on different backup sets. A disadvantage is you must have all of the incremental backup sets available. Differential backup provides backup of files that have changed since a full backup was performed. Differential backup only saves files that are different or new since the last full backup. Differential requires even less time and drive space than incremental and full backup. Backups should always be stored off site in case of fire or damage to computers. Especially for companies with significant amounts of important data it is important that this date is safe. A company could hire a data center to host all data if they don’t have a backup facility themselves. Data backups need to be tested regularly to make sure they work properly. Technology systems changes often also if there were any unaware problems during backup. Cold site is the least expensive type of backup site for an organization to operate. It does not include backed up copies of data and information from original source. Hot site is a duplicate site of the original site of the organization. It uses real time between two sites to mirror the data of the original site using a side area network links and software. This type of backup site is the most expensive to operate. It is used mostly by financial institutions and government agencies. Warm site is between hot and cold. These sites will have a hardware and connectivity already established. Warm site will have a backup on hand, buy they may not be complete and may take several days and week old.
Task 4: 1. $aml3e, 7uci7uu, @lmond$, cra6in9, fl0wer$
2. “Love Birds”- L0vebirds; “The Cat in the Hat”- Tcith1; “Two peas in a pod”- Tpiap9; “please excuse my dear aunt sally”- P3mdas; “open your mind before your mouth”- Oymby3

Similar Documents

Premium Essay

It255

...Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies...

Words: 4296 - Pages: 18