Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Kent state cisco vpn

23/04/2021 Client: muhammad11 Deadline: 2 Day

Using documentation from the vendor, the web, or other resources, find out what methodology Norton Antivirus uses, as well as the methods that McAfee uses. Armed with this information, write a brief essay comparing and contrasting any differences. Also discuss situations in which one might be recommended over the other.Computer Security Fundamentals by Chuck Easttom Chapter 9: Security Technology Chapter 9 Objectives ◼ ◼ ◼ ◼ Evaluate the effectiveness of a scanner based on how it works Choose the best type of firewall for a given organization Understand antispyware Employ intrusion-detection systems to detect problems on your system © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 2 Introduction ◼ ◼ Preceding chapters have described computer crime and computer security. Now, look at the technical details: ❑ Various security devices and software © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 3 Virus Scanners ◼ ◼ ◼ Purpose: to prevent a virus from infecting the system Searches for the signature of a known virus Scanners work in two ways: ❑ ❑ Signature matching Behavior matching © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 4 Virus Scanners (cont.) ❑ Signature matching ◼ ◼ ◼ List of all known virus definitions Updating consists of replacing this file AV scans host, network, and incoming emails for a match © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 5 Virus Scanners (cont.) ❑ Behavior matching (Heuristics): ◼ ◼ ◼ ◼ ❑ Attempts to write to the boot sector Change system files Automate e-mail software Self-multiply These are typical virus behaviors. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 6 Virus Scanners (cont.) ◼ Ongoing virus scanners: ❑ ◼ On-demand virus scanners: ❑ ◼ Run constantly in the background Run only when you launch them Modern AV scanners offer both options. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 7 Virus-Scanning Techniques ◼ E-mail and attachment scanning ❑ ❑ ◼ Examine e-mail on the server, OR. Scan the host computer before passing to the e-mail program. Download scanning ❑ Scan downloaded files. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 8 Virus-Scanning Techniques (cont.) ◼ File scanning ❑ ◼ Files on the host computer are checked periodically. Sandboxing ❑ Isolating suspect files © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 9 Virus-Scanning Techniques (cont.) ❑ Active code scanning ◼ ◼ ◼ ◼ Java applets and ActiveX Visual effects Can be vehicles for malicious code Must be scanned © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 10 Commercial Antivirus Software ◼ Kaspersky ◼ AVG ◼ McAfee Norton ◼ © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 11 Firewalls ◼ ◼ A barrier between your network and the outside world Filters packets based on ❑ ❑ ❑ ❑ Size Source IP Protocol Destination port © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 12 Firewalls (cont.) ◼ ◼ ◼ Need dedicated firewall between trusted network and untrusted network. Cisco is well known for its routers and firewalls. Firewalls can be hardware or software. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 13 Firewall Types and Components ◼ There are several types of firewalls: ❑ ❑ ❑ Packet Filter Stateful Packet Inspection Application © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 14 Firewall Configurations ❑ Network host-based: ◼ ◼ ◼ Software solution installed on an existing operating system. Weakness: It relies on the OS. Must harden the existing operating system. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 15 Firewall Configurations (cont.) ❑ Dual-homed host: ◼ ◼ Installed on a server with at least two network interfaces. Systems inside and outside the firewall can communicate with the dual-homed host, not with each other. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 16 Firewall Configurations (cont.) ❑ Router-based firewall ◼ ◼ ❑ Commonly the first layer of protection Usually a packet filter Screened host ◼ ◼ Combination firewall A bastion host and a packet filter © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 17 Commercial and Free Firewall Products ◼ ◼ ◼ Zone Alarms Cisco Windows Defender © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 18 Firewall Logs ◼ ◼ ◼ ◼ ◼ All firewalls log activity. Logs can provide valuable information. Can locate source of an attack. Can prevent a future attack. Network administrators regularly check for data. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 19 Antispyware ◼ ◼ ◼ ◼ Scans for spyware. Checks for known spyware files, such as AV software scans for known virus files. Maintain a subscription service to keep spyware file definitions up to date, or use auto-update.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Finance Master
Engineering Help
Premium Solutions
Homework Guru
Solutions Store
Quality Assignments
Writer Writer Name Offer Chat
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$34 Chat With Writer
Engineering Help

ONLINE

Engineering Help

Give me a chance, i will do this with my best efforts

$28 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$27 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$25 Chat With Writer
Solutions Store

ONLINE

Solutions Store

Give me a chance, i will do this with my best efforts

$45 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Aspen gastro stop dosage - Carlsberg swot analyse - Secret life of bees thesis statement - Cognitive Consumer Decision-Making Process - Cahn ingold prelog rules priority - Sight in other languages - Managerial economics case study pdf - Baden company has gathered the following information - Social work case presentation powerpoint - From civil disobedience worksheet answers - There's a boy in the girls bathroom sparknotes - To kill a mockingbird scout quotes with page numbers - Compare and contrast two authors - Cmi drg - North walsham infant school - American History- Primary Source Analysis Paper - Diss 2 - Alina, cristina y yo somos buenas amigas. (nosotras) (1) - Connected city of glasgow college - Acs chemworx authoring services - Reflection Common Assignment - CC W 4 D - Visual merchandising display guidelines - Conduct a swot analysis for ibm's smarter planet initiative - Nacl conductivity in water - Discussion - Microeconomics 3 - Wwnorton com studyspace give me liberty - Cloudy with achance of meatballs judi barrett - Dominant culture in organization - Learning focused strategies lesson plan template - How to round off to the nearest cent - North mid blood test - Computer network lab manual using packet tracer - Police Technology - Crime prevention steven p lab - Frisco furniture warners bay - European group for the study of deviance and social control - The gauge pressure in each of the four tires - #10 - Prodigal god discussion questions - Mt103 field 72 format - Euler method second order differential equation calculator - For what values of p does the integral converge - Collins math frameworking 3rd edition answers - What is blue tooth - Caterpillar swot analysis 2016 - Body centered cubic unit cell packing efficiency - House of quality example for food - American history - Three assignments and due dates - Sample persuasive speech outline on volunteering - Cry the beloved country chapter 4 - Robert gray harbour dusk analysis - Statistic home work - Making ethical decisions evaluation answers - Beam deflection macaulay's method - Roland corporation brand positioning - Example of a boundaryless organization - Area under curve units - HR - The mega marketing of depression in japan - Habits of mind of academic writers - What is accounting short answer - Enhanced synthesis paper - CYS-p-11! - Ubertour Project - Structured analysis of competing hypotheses - Functional level strategy of toyota - Bill nye heat transfer conduction convection and radiation - Pearson science year 8 - Astro unl edu naap hr animations hr html - Leicester mercury birth deaths and marriages - Quiz 4 - We have scorched the snake not killed it technique - Krumboltz theory of career choice - Write a 500 word essay - Tomorrow - Echoing green poem summary - Jb hi fi return - The relevant range of activity refers to the - Multivariable test - Precalculus multiple choice questions with answers - Comparing Research Reports - Toseland and rivas types of groups - Holding redlich undergraduate program - Is vinegar and baking soda exothermic or endothermic - Nexus gluco rx calibration - Experiment 2: bacterial transfer to a stab tube and an agar plate - Evolution and trends in information system - Ownership Forms of Health Care Organizations-Response Paper - The three students discussed in detail in this chapter—dan, cassie, and nia—have this in common: - Lifelong learning in medicine and nursing - Discussion by 08/08/2020 by 7: 00 pm ,550 words ,please add references and citations ,APA style - Field service technician job description - Cisco-sccp port 2000 pentest - The longest memory lit charts - Expatriate turnover reduction - Keith pickering the stickman - Which social insight does orwell develop in the passage