Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Kent state cisco vpn

23/04/2021 Client: muhammad11 Deadline: 2 Day

Using documentation from the vendor, the web, or other resources, find out what methodology Norton Antivirus uses, as well as the methods that McAfee uses. Armed with this information, write a brief essay comparing and contrasting any differences. Also discuss situations in which one might be recommended over the other.Computer Security Fundamentals by Chuck Easttom Chapter 9: Security Technology Chapter 9 Objectives ◼ ◼ ◼ ◼ Evaluate the effectiveness of a scanner based on how it works Choose the best type of firewall for a given organization Understand antispyware Employ intrusion-detection systems to detect problems on your system © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 2 Introduction ◼ ◼ Preceding chapters have described computer crime and computer security. Now, look at the technical details: ❑ Various security devices and software © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 3 Virus Scanners ◼ ◼ ◼ Purpose: to prevent a virus from infecting the system Searches for the signature of a known virus Scanners work in two ways: ❑ ❑ Signature matching Behavior matching © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 4 Virus Scanners (cont.) ❑ Signature matching ◼ ◼ ◼ List of all known virus definitions Updating consists of replacing this file AV scans host, network, and incoming emails for a match © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 5 Virus Scanners (cont.) ❑ Behavior matching (Heuristics): ◼ ◼ ◼ ◼ ❑ Attempts to write to the boot sector Change system files Automate e-mail software Self-multiply These are typical virus behaviors. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 6 Virus Scanners (cont.) ◼ Ongoing virus scanners: ❑ ◼ On-demand virus scanners: ❑ ◼ Run constantly in the background Run only when you launch them Modern AV scanners offer both options. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 7 Virus-Scanning Techniques ◼ E-mail and attachment scanning ❑ ❑ ◼ Examine e-mail on the server, OR. Scan the host computer before passing to the e-mail program. Download scanning ❑ Scan downloaded files. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 8 Virus-Scanning Techniques (cont.) ◼ File scanning ❑ ◼ Files on the host computer are checked periodically. Sandboxing ❑ Isolating suspect files © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 9 Virus-Scanning Techniques (cont.) ❑ Active code scanning ◼ ◼ ◼ ◼ Java applets and ActiveX Visual effects Can be vehicles for malicious code Must be scanned © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 10 Commercial Antivirus Software ◼ Kaspersky ◼ AVG ◼ McAfee Norton ◼ © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 11 Firewalls ◼ ◼ A barrier between your network and the outside world Filters packets based on ❑ ❑ ❑ ❑ Size Source IP Protocol Destination port © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 12 Firewalls (cont.) ◼ ◼ ◼ Need dedicated firewall between trusted network and untrusted network. Cisco is well known for its routers and firewalls. Firewalls can be hardware or software. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 13 Firewall Types and Components ◼ There are several types of firewalls: ❑ ❑ ❑ Packet Filter Stateful Packet Inspection Application © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 14 Firewall Configurations ❑ Network host-based: ◼ ◼ ◼ Software solution installed on an existing operating system. Weakness: It relies on the OS. Must harden the existing operating system. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 15 Firewall Configurations (cont.) ❑ Dual-homed host: ◼ ◼ Installed on a server with at least two network interfaces. Systems inside and outside the firewall can communicate with the dual-homed host, not with each other. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 16 Firewall Configurations (cont.) ❑ Router-based firewall ◼ ◼ ❑ Commonly the first layer of protection Usually a packet filter Screened host ◼ ◼ Combination firewall A bastion host and a packet filter © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 17 Commercial and Free Firewall Products ◼ ◼ ◼ Zone Alarms Cisco Windows Defender © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 18 Firewall Logs ◼ ◼ ◼ ◼ ◼ All firewalls log activity. Logs can provide valuable information. Can locate source of an attack. Can prevent a future attack. Network administrators regularly check for data. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 19 Antispyware ◼ ◼ ◼ ◼ Scans for spyware. Checks for known spyware files, such as AV software scans for known virus files. Maintain a subscription service to keep spyware file definitions up to date, or use auto-update.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Finance Master
Engineering Help
Premium Solutions
Homework Guru
Solutions Store
Quality Assignments
Writer Writer Name Offer Chat
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$34 Chat With Writer
Engineering Help

ONLINE

Engineering Help

Give me a chance, i will do this with my best efforts

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$27 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$25 Chat With Writer
Solutions Store

ONLINE

Solutions Store

Give me a chance, i will do this with my best efforts

$45 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Puget sound divers is a company that provides diving services - If budgets are to be effective, there must be - Https owl english purdue edu owl resource 747 03 - Reading response - Graduation garden party dundee - Nelson mandela favorite poem invictus - I need 3-4 pages double space (1000 words) on answering my questions - Uma umassonline - Halton gill bunk barn - Fsgdfg - Banker's algorithm in c source code - Three legs of lobbying in your advocacy efforts - Excel forecast ets confint - Dometic toilet flush switch - The snake goddess sculpture belongs to which culture - I just wanna be average essay - 3523 wrightwood ct studio city ca 91604 - The management of zigby manufacturing prepared - Water cycle unit test - Assigned Problems - How to write an exegesis philosophy - P4 4 multiple and single step income retained earnings - Teach like a champion strategies list - The near in blood the nearer bloody - What insight does roi give into investment performance - If i were a boy just for a day - Delaney company leases an automobile with a fair value - Newspaper seller problem simulation excel - Ieee 802.3 an 2006 - Journal of the northwest communication association - Discussion - Combustion of propene equation - The austrian oak strongman - Grid organizational development ppt - Social networking site for social responsibility project - Leccion 3 estructura activities 3.1 answers - 3 pages - National Archives Assignment - List of hcpcs level ii modifiers - The boy on the wooden box questions and answers - Townley grammar sixth form - Francis ford coppola family tree - At may 31, 2017, the accounts of lopez company show the following. - What approaches could have yielded additional valuable information - Why is it important to select the student interface in the wireshark? - Operations management harvard business review - 5 stay interview questions - Seeing the light by olive senior - Truman show camera angles - Prepare a horizontal analysis of the balance sheet - Argumentative essay on cell phones in school - Become friendlier more approachable crossword - As nzs 3551 standard - Cmit 425 risk assessment paper - On the loan worksheet in cell c9 - Rte breakfast cereal industry - Public Speaking-5 - What is corrected absorbance - Find the indicated real nth roots of a - Reflection Paper - Frank goldsmith jr titanic - Summarize machiavelli's view of human nature - Fact sheet template word - Assignment - Stolen party - Big Data Analytics - Responsibilities of an uber driver - The following items are found in the financial statements - Group Processes and Stages of Formation - Jeff nippard chest hypertrophy program - If is invested at 5 interest - Odc ip4 - Developing policies and procedures for implementation - What are the 7 domains of a typical it infrastructure - Beaconhouse national university programs - Presentation script - The girl who loved tom gordon chapter 1 summary - Multidimensional framework in social work - Titebond 3 data sheet - What is a lexical error - Reflective cover letter example - Mutual benefit bailment definition - Army blc sharp essay - Jominy end quench test theory - For your advice please - Excel independent project 5 4 - How to win erpsim game - Transgenic fly virtual lab - Lyryx linear algebra solutions - Cueing hierarchy for articulation - Deliver in 24hrs - Carpers 5 ways of knowing - Case study 2 improving e mail marketing response - A knight's tale green tunic - Only Bethuel Best - 3/32 arundel street fremantle - 2 paragraph discussion - Price and channel strategy mkt 571 - I tituba black witch of salem chapter summary - Easy cite rmit