Firewall
-is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
-can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.
source:google.com
Monday, December 6, 2010
IT104:Cyril Beloy
1. Why has there been a dramatic increase in the number of computer related security incidents in recent years?
*In today's generation gadgets and computers are found everywhere whether you are in the markets, terminals, houses, commercial building, schools, etc... Every year the number of computer related incidents is increasing because of computers are spreading in entire globe. Computer criminals are also increasing and they make Computer and Internet crimes like Viruses, Worms, Trojan horse, and etc... In this crimes they can create their own business or they can find financial money in a wrong way.
2. What are some characteristic of Common Computer Criminals including their objectives?
*Perpetrators
-}is a computer criminals have the same motives of seekers one thing a challenge propagators looking for financial game industrial files.
*Some types of Perpetrators:
[]Hacker=>test limit of the system and gain publicity.
[]Cracker=>cost problem,steal data and curapt system.
[]Insider=>make money, distract companies information system.
[]Cybe Criminals=>making a fake money.
[]Cyber Terrorist=>destroy key infrastracture component.
3. What actions must be taken in Response to a Security Incidents?
*Security Incidents in Computers today can damage your daily life or in your business specially when it is talking about computers. The actions must be taken in responce to this incidents for me as an I.T. student is to make a special or secret program code that can damage, destruct and control the viruses, worms, trojan horse, and etc... to damage the unit.
*In today's generation gadgets and computers are found everywhere whether you are in the markets, terminals, houses, commercial building, schools, etc... Every year the number of computer related incidents is increasing because of computers are spreading in entire globe. Computer criminals are also increasing and they make Computer and Internet crimes like Viruses, Worms, Trojan horse, and etc... In this crimes they can create their own business or they can find financial money in a wrong way.
2. What are some characteristic of Common Computer Criminals including their objectives?
*Perpetrators
-}is a computer criminals have the same motives of seekers one thing a challenge propagators looking for financial game industrial files.
*Some types of Perpetrators:
[]Hacker=>test limit of the system and gain publicity.
[]Cracker=>cost problem,steal data and curapt system.
[]Insider=>make money, distract companies information system.
[]Cybe Criminals=>making a fake money.
[]Cyber Terrorist=>destroy key infrastracture component.
3. What actions must be taken in Response to a Security Incidents?
*Security Incidents in Computers today can damage your daily life or in your business specially when it is talking about computers. The actions must be taken in responce to this incidents for me as an I.T. student is to make a special or secret program code that can damage, destruct and control the viruses, worms, trojan horse, and etc... to damage the unit.
Subscribe to:
Posts (Atom)