Question
Please help Fill out the following tables Table 1: Network and Computer Security Software Security Software Description and Function Two Examples of Commercially Available Products
Please help
Fill out the following tables
Table 1: Network and Computer Security Software
Security Software | Description and Function | Two Examples of Commercially Available Products that Provide this Functionality |
Spam filter |
|
|
URL filter |
|
|
Content filter |
|
|
MAC Filtering |
|
|
IP/MAC Binding |
|
|
Malware inspection |
|
|
Intrusion Detection System |
|
|
Access Control List (ACL) |
|
|
Table 2: Types of Firewalls
Firewall Type/Device | Description and Function | Two Examples of Commercially Available Products that Provide this Functionality |
Routed Firewall |
|
|
Transparent Firewall |
|
|
Packet Filtering Firewall |
|
|
Circuit Level Proxy |
|
|
Application Level Gateway/Proxy Server |
|
|
Unified Threat Management Device |
|
|
All-in-One Security Appliance |
|
|
Table 3- Types of Malicious Software
Name of Malicious Software | Description of Malware (Describe how program installs, what it is intended for and how it is spread) | Provide at Least Two Current (last 5 years) examples | Mitigation (List solution for countering this threat, provide a commercial example) |
Virus | A computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data). Viruses require the user to run an infected program or operating system to spread. | Cryptolocker, Rombertick | Anti-virus software, Windows Defender |
Worm |
|
|
|
Trojan horse |
|
|
|
Spyware |
|
|
|
Ransomware |
|
|
|
Adware |
|
|
|
Table 4 Types of Attacks and Security Threats
Type of Network/Computer Attack and Security Threat | Description | Mitigation |
Phishing |
|
|
Password Stealing |
|
|
Identity Theft |
|
|
Dumpster Diving |
|
|
Denial of Service/Distributed Denial of Service |
|
|
Smurf Attacks |
|
|
Buffer Overflow |
|
|
Man-in-the-Middle Attacks |
|
|
Packet Sniffing |
|
|
FTP Bounce |
|
|
War Driving |
|
|
WEP Cracking/WPA Cracking |
|
|
Rogue Access Points/ Evil Twin |
|
|
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started