Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Kent state cisco vpn

23/04/2021 Client: muhammad11 Deadline: 2 Day

Using documentation from the vendor, the web, or other resources, find out what methodology Norton Antivirus uses, as well as the methods that McAfee uses. Armed with this information, write a brief essay comparing and contrasting any differences. Also discuss situations in which one might be recommended over the other.Computer Security Fundamentals by Chuck Easttom Chapter 9: Security Technology Chapter 9 Objectives ◼ ◼ ◼ ◼ Evaluate the effectiveness of a scanner based on how it works Choose the best type of firewall for a given organization Understand antispyware Employ intrusion-detection systems to detect problems on your system © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 2 Introduction ◼ ◼ Preceding chapters have described computer crime and computer security. Now, look at the technical details: ❑ Various security devices and software © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 3 Virus Scanners ◼ ◼ ◼ Purpose: to prevent a virus from infecting the system Searches for the signature of a known virus Scanners work in two ways: ❑ ❑ Signature matching Behavior matching © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 4 Virus Scanners (cont.) ❑ Signature matching ◼ ◼ ◼ List of all known virus definitions Updating consists of replacing this file AV scans host, network, and incoming emails for a match © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 5 Virus Scanners (cont.) ❑ Behavior matching (Heuristics): ◼ ◼ ◼ ◼ ❑ Attempts to write to the boot sector Change system files Automate e-mail software Self-multiply These are typical virus behaviors. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 6 Virus Scanners (cont.) ◼ Ongoing virus scanners: ❑ ◼ On-demand virus scanners: ❑ ◼ Run constantly in the background Run only when you launch them Modern AV scanners offer both options. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 7 Virus-Scanning Techniques ◼ E-mail and attachment scanning ❑ ❑ ◼ Examine e-mail on the server, OR. Scan the host computer before passing to the e-mail program. Download scanning ❑ Scan downloaded files. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 8 Virus-Scanning Techniques (cont.) ◼ File scanning ❑ ◼ Files on the host computer are checked periodically. Sandboxing ❑ Isolating suspect files © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 9 Virus-Scanning Techniques (cont.) ❑ Active code scanning ◼ ◼ ◼ ◼ Java applets and ActiveX Visual effects Can be vehicles for malicious code Must be scanned © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 10 Commercial Antivirus Software ◼ Kaspersky ◼ AVG ◼ McAfee Norton ◼ © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 11 Firewalls ◼ ◼ A barrier between your network and the outside world Filters packets based on ❑ ❑ ❑ ❑ Size Source IP Protocol Destination port © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 12 Firewalls (cont.) ◼ ◼ ◼ Need dedicated firewall between trusted network and untrusted network. Cisco is well known for its routers and firewalls. Firewalls can be hardware or software. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 13 Firewall Types and Components ◼ There are several types of firewalls: ❑ ❑ ❑ Packet Filter Stateful Packet Inspection Application © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 14 Firewall Configurations ❑ Network host-based: ◼ ◼ ◼ Software solution installed on an existing operating system. Weakness: It relies on the OS. Must harden the existing operating system. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 15 Firewall Configurations (cont.) ❑ Dual-homed host: ◼ ◼ Installed on a server with at least two network interfaces. Systems inside and outside the firewall can communicate with the dual-homed host, not with each other. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 16 Firewall Configurations (cont.) ❑ Router-based firewall ◼ ◼ ❑ Commonly the first layer of protection Usually a packet filter Screened host ◼ ◼ Combination firewall A bastion host and a packet filter © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 17 Commercial and Free Firewall Products ◼ ◼ ◼ Zone Alarms Cisco Windows Defender © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 18 Firewall Logs ◼ ◼ ◼ ◼ ◼ All firewalls log activity. Logs can provide valuable information. Can locate source of an attack. Can prevent a future attack. Network administrators regularly check for data. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 19 Antispyware ◼ ◼ ◼ ◼ Scans for spyware. Checks for known spyware files, such as AV software scans for known virus files. Maintain a subscription service to keep spyware file definitions up to date, or use auto-update.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Finance Master
Engineering Help
Premium Solutions
Homework Guru
Solutions Store
Quality Assignments
Writer Writer Name Offer Chat
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$34 Chat With Writer
Engineering Help

ONLINE

Engineering Help

Give me a chance, i will do this with my best efforts

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$27 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$25 Chat With Writer
Solutions Store

ONLINE

Solutions Store

Give me a chance, i will do this with my best efforts

$45 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Information taken from an existing classified source - Mk k545whi data socket module rj45 - Please Respond if you can answer in 12 hours - Writing centre adelaide uni - Topshop young scot card - Iqa feedback to assessors examples - Job safety analysis training powerpoint - Husband wife LOVe +91-7023339183 problems solution molviji - Strategic management involves all of the following except - Which of the following is not a distortion in perception - Spiritual to Rock and Roll - Delivering health care in america study guide - How hotdogs are made the brutal graphic truth - What are the elements of drama - Virtuous Person, Virtuous Citizen - Discuss ways organizations have built a csirt - Projective techniques word association - Should the us convert to a zero personal income tax - This paper - Capilano university north american business management - Systems analysis and design 8th edition shelly rosenblatt - La beaute humaine pichon - Watts per meter squared to decibels calculator - Aflac mission and vision statement - Specific heat capacity table j gc - Completing year 11 and 12 at tafe qld - The psychology of women margaret matlin pdf - 16c first street magill - How to make fake blood - Week 1 Data Analysis Discussion - Centric commercial finance shawbrook - Regular practices of the jains include - Electronic health care - Ccna 3 final exam answers - Paper - Importance of collecting data for intake and assessment forms - How to read a sonnet aloud - History of Mental illness in America - Financial statement analysis lessens the need for expert judgment - Human resources for nike shoes - Final Project - Writing a purpose statement for research - Governments often intervene in international trade and impose quotas to - Python code - Sports illustrated media kit demographics - Van den esschert v chappell - Wisc v sample report - Convert degrees to mils - Trireme labeled diagram - Head loss in pipe - Inspirational stories about persistence - Topic: NP and APN Roles Comparison - Full block style letter - Chapter 7 bureaucracy and formal organizations - Alcatel lucent merger case study - Introduction to java programming comprehensive version 11e pdf - Write a 350- to 525-word article about your evaluation and proposed changes to the facility or service that can help mitigate negative effects. - Business Intelligence - Nursing Informatics Assignment - Tolstoy what is art summary - L dee fink significant learning - 1023 notification of incorrect answers - How to find the integral of an absolute value - In leaves no step had trodden black figure of speech - Diabetes and insulin signaling case study answers - Taming the anger monster anne davidson - Nurse practitioner core competencies 2016 - Bga ball grid array - Pick one of the following terms for your research: Compliance, codes of ethics, ethics officers, formal controls, or ethics audit. - Birthplace of three religions - Unit test part 2 polynomials - Education Essay - 40 amp mcb screwfix - Project cost and time management - When i consider how my life is spent - Case Study E-commerce - Kelly coe net worth - Rig veda creation hymn summary - The Value of the Humanities- APA format - Port glasgow swimming pool leaflet - Biopsychological approach example - 2.10 unit test voices of an emerging nation - Unit 6 DB: Personality Testing - The Big Five - Carlsberg organizational structure - The evolution lab answer key - Bpp acca booking form - Trading account format pdf - 1.5 ml eppendorf tubes vwr - Can you recycle batiste dry shampoo - Simple random sampling - DISCUSSIONS AND REFLECTION - Project management - Mcdonald's annual report 2009 - Week 5 - Social policy welfare - Basadur simplex problem solving process - Properties of water slideshare - Information Governance Research paper 2 - Global dimension of management - Childcare essay examples