Question
Please help with following question! Fill out the following tables Table 1: Network and Computer Security Software Security Software Description and Function Two Examples of
Please help with following question!
Fill out the following tables
Table 1: Network and Computer Security Software
Security Software | Description and Function | Two Examples of Commercially Available Products that Provide this Functionality |
Spam filter | ||
URL filter | ||
Content filter | ||
MAC Filtering | ||
IP/MAC Binding | ||
Malware inspection | ||
Intrusion Detection System | ||
Access Control List (ACL) |
Table 2: Types of Firewalls
Firewall Type/Device | Description and Function | Two Examples of Commercially Available Products that Provide this Functionality |
Routed Firewall | ||
Transparent Firewall | ||
Packet Filtering Firewall | ||
Circuit Level Proxy | ||
Application Level Gateway/Proxy Server | ||
Unified Threat Management Device | ||
All-in-One Security Appliance |
Table 3- Types of Malicious Software
Name of Malicious Software | Description of Malware (Describe how program installs, what it is intended for and how it is spread) | Provide at Least Two Current (last 5 years) examples | Mitigation (List solution for countering this threat, provide a commercial example) |
Virus | A computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data). Viruses require the user to run an infected program or operating system to spread. | Cryptolocker, Rombertick | Anti-virus software, Windows Defender |
Worm | |||
Trojan horse | |||
Spyware | |||
Ransomware | |||
Adware |
Table 4 Types of Attacks and Security Threats
Type of Network/Computer Attack and Security Threat | Description | Mitigation |
Phishing | ||
Password Stealing | ||
Identity Theft | ||
Dumpster Diving | ||
Denial of Service/Distributed Denial of Service | ||
Smurf Attacks | ||
Buffer Overflow | ||
Man-in-the-Middle Attacks | ||
Packet Sniffing | ||
FTP Bounce | ||
War Driving | ||
WEP Cracking/WPA Cracking | ||
Rogue Access Points/ Evil Twin | ||
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started