Question: Please help Fill out the following tables Table 1: Network and Computer Security Software Security Software Description and Function Two Examples of Commercially Available Products

Please help

Fill out the following tables

Table 1: Network and Computer Security Software

Security Software

Description and Function

Two Examples of Commercially Available Products that Provide this Functionality

Spam filter

URL filter

Content filter

MAC Filtering

IP/MAC Binding

Malware inspection

Intrusion Detection System

Access Control List (ACL)

Table 2: Types of Firewalls

Firewall Type/Device

Description and Function

Two Examples of Commercially Available Products that Provide this Functionality

Routed Firewall

Transparent Firewall

Packet Filtering Firewall

Circuit Level Proxy

Application Level Gateway/Proxy Server

Unified Threat Management Device

All-in-One Security Appliance

Table 3- Types of Malicious Software

Name of Malicious Software

Description of Malware (Describe how program installs, what it is intended for and how it is spread)

Provide at Least Two Current (last 5 years) examples

Mitigation (List solution for countering this threat, provide a commercial example)

Virus

A computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data). Viruses require the user to run an infected program or operating system to spread.

Cryptolocker, Rombertick

Anti-virus software, Windows Defender

Worm

Trojan horse

Spyware

Ransomware

Adware

Table 4 Types of Attacks and Security Threats

Type of Network/Computer Attack and Security Threat

Description

Mitigation

Phishing

Password Stealing

Identity Theft

Dumpster Diving

Denial of Service/Distributed Denial of Service

Smurf Attacks

Buffer Overflow

Man-in-the-Middle Attacks

Packet Sniffing

FTP Bounce

War Driving

WEP Cracking/WPA Cracking

Rogue Access Points/ Evil Twin

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!