Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Kent state cisco vpn

23/04/2021 Client: muhammad11 Deadline: 2 Day

Using documentation from the vendor, the web, or other resources, find out what methodology Norton Antivirus uses, as well as the methods that McAfee uses. Armed with this information, write a brief essay comparing and contrasting any differences. Also discuss situations in which one might be recommended over the other.Computer Security Fundamentals by Chuck Easttom Chapter 9: Security Technology Chapter 9 Objectives ◼ ◼ ◼ ◼ Evaluate the effectiveness of a scanner based on how it works Choose the best type of firewall for a given organization Understand antispyware Employ intrusion-detection systems to detect problems on your system © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 2 Introduction ◼ ◼ Preceding chapters have described computer crime and computer security. Now, look at the technical details: ❑ Various security devices and software © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 3 Virus Scanners ◼ ◼ ◼ Purpose: to prevent a virus from infecting the system Searches for the signature of a known virus Scanners work in two ways: ❑ ❑ Signature matching Behavior matching © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 4 Virus Scanners (cont.) ❑ Signature matching ◼ ◼ ◼ List of all known virus definitions Updating consists of replacing this file AV scans host, network, and incoming emails for a match © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 5 Virus Scanners (cont.) ❑ Behavior matching (Heuristics): ◼ ◼ ◼ ◼ ❑ Attempts to write to the boot sector Change system files Automate e-mail software Self-multiply These are typical virus behaviors. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 6 Virus Scanners (cont.) ◼ Ongoing virus scanners: ❑ ◼ On-demand virus scanners: ❑ ◼ Run constantly in the background Run only when you launch them Modern AV scanners offer both options. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 7 Virus-Scanning Techniques ◼ E-mail and attachment scanning ❑ ❑ ◼ Examine e-mail on the server, OR. Scan the host computer before passing to the e-mail program. Download scanning ❑ Scan downloaded files. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 8 Virus-Scanning Techniques (cont.) ◼ File scanning ❑ ◼ Files on the host computer are checked periodically. Sandboxing ❑ Isolating suspect files © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 9 Virus-Scanning Techniques (cont.) ❑ Active code scanning ◼ ◼ ◼ ◼ Java applets and ActiveX Visual effects Can be vehicles for malicious code Must be scanned © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 10 Commercial Antivirus Software ◼ Kaspersky ◼ AVG ◼ McAfee Norton ◼ © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 11 Firewalls ◼ ◼ A barrier between your network and the outside world Filters packets based on ❑ ❑ ❑ ❑ Size Source IP Protocol Destination port © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 12 Firewalls (cont.) ◼ ◼ ◼ Need dedicated firewall between trusted network and untrusted network. Cisco is well known for its routers and firewalls. Firewalls can be hardware or software. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 13 Firewall Types and Components ◼ There are several types of firewalls: ❑ ❑ ❑ Packet Filter Stateful Packet Inspection Application © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 14 Firewall Configurations ❑ Network host-based: ◼ ◼ ◼ Software solution installed on an existing operating system. Weakness: It relies on the OS. Must harden the existing operating system. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 15 Firewall Configurations (cont.) ❑ Dual-homed host: ◼ ◼ Installed on a server with at least two network interfaces. Systems inside and outside the firewall can communicate with the dual-homed host, not with each other. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 16 Firewall Configurations (cont.) ❑ Router-based firewall ◼ ◼ ❑ Commonly the first layer of protection Usually a packet filter Screened host ◼ ◼ Combination firewall A bastion host and a packet filter © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 17 Commercial and Free Firewall Products ◼ ◼ ◼ Zone Alarms Cisco Windows Defender © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 18 Firewall Logs ◼ ◼ ◼ ◼ ◼ All firewalls log activity. Logs can provide valuable information. Can locate source of an attack. Can prevent a future attack. Network administrators regularly check for data. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 19 Antispyware ◼ ◼ ◼ ◼ Scans for spyware. Checks for known spyware files, such as AV software scans for known virus files. Maintain a subscription service to keep spyware file definitions up to date, or use auto-update.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Finance Master
Engineering Help
Premium Solutions
Homework Guru
Solutions Store
Quality Assignments
Writer Writer Name Offer Chat
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$34 Chat With Writer
Engineering Help

ONLINE

Engineering Help

Give me a chance, i will do this with my best efforts

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$27 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$25 Chat With Writer
Solutions Store

ONLINE

Solutions Store

Give me a chance, i will do this with my best efforts

$45 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Existentialism in education ppt - Flower duet composer - Create a Graphic Representation of your Research my topic is does abouse cause juvinel crime - How does thickness of a wire affect resistance - Purchase order process flow chart - How does the minister's black veil emphasize his individuality - Tco 1 slavery expanded with the growth of - Agilent technologies australia m pty ltd - The comforts of home flannery o connor sparknotes - After seeing advertisements for the toyota prius joel - The baltimore waltz play pdf - Mini car club of nsw - Webkit moz o ms khtml - 2 price controls in the florida orange market - Comparison analysis Essay - The stranger book club questions - A single shard summary - Berkshire instruments - Learning to read by frances ellen watkins harper answer key - Gas stoichiometry worksheet answers - Annotated bibliography and outline leadership behavior - Cable resistance table bs7671 - Mastery problem 3 6 accounting - Writing persuasive messages business communication - Bye bye bus driver - 41 mann street invermay - Example of likert scale questionnaire - Psychcentral com quizzes personality start php - Thought Responses - Why things bite back pdf - Cloverleaf 4 h club - Illustrated lady tattoo rome ny - Human resource test - Brk carbon monoxide alarm - Chemistry - Vertical software packages exist for training operations management - Non elastic impression materials - Accounting for state and local governments part 2 - 0.76666 as a fraction - Computer science department ucl - Edmund emil kemper ii - Dr lai fon min - F10 veterinary disinfectant ingredients - Term and reversion valuation - Which of the following is a theme from macbeth - Dartmouth clinical psychology phd - Week 2 Discussion - 15/1 assembly drive varsity lakes - Assignment 2 the gig economy - APN discussion week 1 - Nanda nursing diagnosis list 2020 - Bus 640 managerial economics - Iris center classroom management - How did st dominic became a saint - 6 page APA Paper on Strategic Planning Process / Strategy Change Cycle - Wonderlic Test - The computer workstation furniture manufacturing that santana rey - Vector worksheets with answers - Spencer's flea market in dover delaware - Explain how using edi facilitates electronic transactions in healthcare - Cips second hand books - Vision statement examples fortune 500 - Tessellation with two shapes - How to read a sonnet aloud - Bombs away video games corporation - Sparknotes the lottery by shirley jackson - Week 7 Organizational Change Paper - How to find area of a kite - Karwa chauth puja vidhi in english - Don juan tirso de molina pdf - Lady macbeth wants to kill duncan quote - Three gorges dam stakeholders - Geometry proof practice worksheet with answers - Pregnancy worksheet 3 answers - Powerpoint on why college athletes should be paid - What i ve learned from men by barbara ehrenreich - Cambridge latin course book 2 stage 15 - Quickbooks assignment - A manufacturer makes two products doors and windows - Irony in the interlopers - Cattell horn's two factor theory 1966 - Groups and teams in organizational behavior ppt - 5 pebble pl commack ny 11725 - Single source analysis essay example - Packet tracer tutorial 2 - Dux prodigy hot water system pilot light - RESEARCH AND ADVOCACY - 1800-2100 cultural Psyc individual assignment - History class - School sport unit nsw - Brown's grammatical morphemes by age - Module 02 Written Assignment - Literary Analysis of Modernist Literature - Social Work Blog Questions - 3 1 t 2 dy dt 2ty y 3 1 - Distributed cognition in education - Calcium carbonate sulfuric acid - Central queensland university melbourne - Generating hydrogen gas lab answers - Innovation management - The good teachers carol ann duffy