Question: Please help Fill out the following tables Table 1: Network and Computer Security Software Security Software Description and Function Two Examples of Commercially Available Products
Please help
Fill out the following tables
Table 1: Network and Computer Security Software
| Security Software | Description and Function | Two Examples of Commercially Available Products that Provide this Functionality |
| Spam filter |
|
|
| URL filter |
|
|
| Content filter |
|
|
| MAC Filtering |
|
|
| IP/MAC Binding |
|
|
| Malware inspection |
|
|
| Intrusion Detection System |
|
|
| Access Control List (ACL) |
|
|
Table 2: Types of Firewalls
| Firewall Type/Device | Description and Function | Two Examples of Commercially Available Products that Provide this Functionality |
| Routed Firewall |
|
|
| Transparent Firewall |
|
|
| Packet Filtering Firewall |
|
|
| Circuit Level Proxy |
|
|
| Application Level Gateway/Proxy Server |
|
|
| Unified Threat Management Device |
|
|
| All-in-One Security Appliance |
|
|
Table 3- Types of Malicious Software
| Name of Malicious Software | Description of Malware (Describe how program installs, what it is intended for and how it is spread) | Provide at Least Two Current (last 5 years) examples | Mitigation (List solution for countering this threat, provide a commercial example) |
| Virus | A computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data). Viruses require the user to run an infected program or operating system to spread. | Cryptolocker, Rombertick | Anti-virus software, Windows Defender |
| Worm |
|
|
|
| Trojan horse |
|
|
|
| Spyware |
|
|
|
| Ransomware |
|
|
|
| Adware |
|
|
|
Table 4 Types of Attacks and Security Threats
| Type of Network/Computer Attack and Security Threat | Description | Mitigation |
| Phishing |
|
|
| Password Stealing |
|
|
| Identity Theft |
|
|
| Dumpster Diving |
|
|
| Denial of Service/Distributed Denial of Service |
|
|
| Smurf Attacks |
|
|
| Buffer Overflow |
|
|
| Man-in-the-Middle Attacks |
|
|
| Packet Sniffing |
|
|
| FTP Bounce |
|
|
| War Driving |
|
|
| WEP Cracking/WPA Cracking |
|
|
| Rogue Access Points/ Evil Twin |
|
|
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
