Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Kent state cisco vpn

23/04/2021 Client: muhammad11 Deadline: 2 Day

Using documentation from the vendor, the web, or other resources, find out what methodology Norton Antivirus uses, as well as the methods that McAfee uses. Armed with this information, write a brief essay comparing and contrasting any differences. Also discuss situations in which one might be recommended over the other.Computer Security Fundamentals by Chuck Easttom Chapter 9: Security Technology Chapter 9 Objectives ◼ ◼ ◼ ◼ Evaluate the effectiveness of a scanner based on how it works Choose the best type of firewall for a given organization Understand antispyware Employ intrusion-detection systems to detect problems on your system © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 2 Introduction ◼ ◼ Preceding chapters have described computer crime and computer security. Now, look at the technical details: ❑ Various security devices and software © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 3 Virus Scanners ◼ ◼ ◼ Purpose: to prevent a virus from infecting the system Searches for the signature of a known virus Scanners work in two ways: ❑ ❑ Signature matching Behavior matching © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 4 Virus Scanners (cont.) ❑ Signature matching ◼ ◼ ◼ List of all known virus definitions Updating consists of replacing this file AV scans host, network, and incoming emails for a match © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 5 Virus Scanners (cont.) ❑ Behavior matching (Heuristics): ◼ ◼ ◼ ◼ ❑ Attempts to write to the boot sector Change system files Automate e-mail software Self-multiply These are typical virus behaviors. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 6 Virus Scanners (cont.) ◼ Ongoing virus scanners: ❑ ◼ On-demand virus scanners: ❑ ◼ Run constantly in the background Run only when you launch them Modern AV scanners offer both options. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 7 Virus-Scanning Techniques ◼ E-mail and attachment scanning ❑ ❑ ◼ Examine e-mail on the server, OR. Scan the host computer before passing to the e-mail program. Download scanning ❑ Scan downloaded files. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 8 Virus-Scanning Techniques (cont.) ◼ File scanning ❑ ◼ Files on the host computer are checked periodically. Sandboxing ❑ Isolating suspect files © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 9 Virus-Scanning Techniques (cont.) ❑ Active code scanning ◼ ◼ ◼ ◼ Java applets and ActiveX Visual effects Can be vehicles for malicious code Must be scanned © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 10 Commercial Antivirus Software ◼ Kaspersky ◼ AVG ◼ McAfee Norton ◼ © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 11 Firewalls ◼ ◼ A barrier between your network and the outside world Filters packets based on ❑ ❑ ❑ ❑ Size Source IP Protocol Destination port © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 12 Firewalls (cont.) ◼ ◼ ◼ Need dedicated firewall between trusted network and untrusted network. Cisco is well known for its routers and firewalls. Firewalls can be hardware or software. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 13 Firewall Types and Components ◼ There are several types of firewalls: ❑ ❑ ❑ Packet Filter Stateful Packet Inspection Application © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 14 Firewall Configurations ❑ Network host-based: ◼ ◼ ◼ Software solution installed on an existing operating system. Weakness: It relies on the OS. Must harden the existing operating system. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 15 Firewall Configurations (cont.) ❑ Dual-homed host: ◼ ◼ Installed on a server with at least two network interfaces. Systems inside and outside the firewall can communicate with the dual-homed host, not with each other. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 16 Firewall Configurations (cont.) ❑ Router-based firewall ◼ ◼ ❑ Commonly the first layer of protection Usually a packet filter Screened host ◼ ◼ Combination firewall A bastion host and a packet filter © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 17 Commercial and Free Firewall Products ◼ ◼ ◼ Zone Alarms Cisco Windows Defender © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 18 Firewall Logs ◼ ◼ ◼ ◼ ◼ All firewalls log activity. Logs can provide valuable information. Can locate source of an attack. Can prevent a future attack. Network administrators regularly check for data. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 19 Antispyware ◼ ◼ ◼ ◼ Scans for spyware. Checks for known spyware files, such as AV software scans for known virus files. Maintain a subscription service to keep spyware file definitions up to date, or use auto-update.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Finance Master
Engineering Help
Premium Solutions
Homework Guru
Solutions Store
Quality Assignments
Writer Writer Name Offer Chat
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$34 Chat With Writer
Engineering Help

ONLINE

Engineering Help

Give me a chance, i will do this with my best efforts

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$27 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$25 Chat With Writer
Solutions Store

ONLINE

Solutions Store

Give me a chance, i will do this with my best efforts

$45 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Grace to you sermon - Access grader project chapter 2 - Difference between test-retest and intra-rater reliability - Mt gambier to adelaide bus - Dehydration of cyclohexanol mechanism - Nutrition discussion - What does negotiation mean when discussing network protocols - Which psychoanalytic theorist's method was later renamed hypnosis? - Csi wildlife worksheet answer key - Drawing of a leaf - Pgcc psychology 1010 final exam - Camp green lake warden - Foner eric give me liberty pdf - Harvard project management simulation answers - Gibson energy ltd bank reconciliation - Appendix 9a grocery docx amazon - An investor has two bonds in her portfolio - Marketing exam - Achetez de la kétamine en ligne, achetez de la poudre MXM, achetez de la poudre 1P-LSD, achetez de la méthadone, achetez du MDPV, achetez de la poudre DMT en ligne. - Motivation biological psychological and environmental 3rd edition pdf - Pol 201 final paper - SQL Database - Wk 5, HCS 335: Public Health and Social Responsibility - Walmart inc takes on amazon com case study solution - Tafe sa murray bridge - Moreton bay council auctions - Points lines planes and angles - A number q tripled algebraic expression - How to study for pharmacology nursing - Chapter 15 section 1 a new deal fights the depression - DISCUSSION REPLY - Tst 102 sraw test plan - Paper - Tpm waterfall method - Zinc gluconate nasal spray - The breakfast club communication analysis - Air force leadership vision statement examples - 0.75 mm2 to awg - ORG 535 Week 1 Apply: HR Competency Journal - Probation and Parole unit 1 Assignment - One hundred thirty five ten thousandths in standard form - Assignment 2: Foreign Currency Risk - Swot analysis of amusement park - Tom brennan quotes about tess - Radius of electron proton and neutron - Omron rx inverter user manual - Merritt's bakery case study - Sql data analyst resume - Wellness vs illness model of care - With reference to the strategy highlight 8.2, the tata group's corporate strategy is attempting to - Hindu symbols and meanings - What is insufficient logging and monitoring - Public speaking course brisbane - Scion hero character sheet - Media ethics issues and cases - Discussion questions for everyday use by alice walker - A nondiscriminating profit maximizing monopolist - Air pressure is measured in what - Label the following neurons in figure 19.3 - Merrill lynch supernova case study summary - Galbraith the position of poverty - Bloomberg businessweek b school connection program - University of bradford referencing - Jm barrie net worth - Spectroscopy lab answer key - Health management - What is the expected market return - In assessing candidates for spy missions - Chapter 7 government policy and international trade - Unit 5 assessment 4 code org answers - Explain the concept of health information exchange hie - Mass of acetic acid in vinegar - Contemporary management issues and challenges - Urinary system case study answers - Ascii code for underscore - Microsoft nokia acquisition case study - Frank simmons band hank lane - Hidden intellectualism summary they say i say - How to make 75 cents - What is the method of joints - What command will display all connected eigrp routers - Vocabulary words from the outsiders - Art discussion questions - Agreement between northern and southern states - Sinusoidal equations that model real world phenomena - How does partnership working deliver better outcomes - Bouthayna mohamed mustapha sheraqi - Assignment - Zero plagiarism - A debit to an expense account will - Honeywell zone control hz322 - John deere green pantone - Vieques tiene playas muy limpias - Ford car exploding gas tank - Four major indo european language branches - What are the seven elements of an effective compliance program - Please select the correct sentence from the options below - Concept of entrepreneurship ppt - Hw1 - Bill henson exhibition melbourne - Nmc revalidation templates completed