Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please help with following question! Fill out the following tables Table 1: Network and Computer Security Software Security Software Description and Function Two Examples of

Please help with following question!

Fill out the following tables

Table 1: Network and Computer Security Software

Security Software

Description and Function

Two Examples of Commercially Available Products that Provide this Functionality

Spam filter

URL filter

Content filter

MAC Filtering

IP/MAC Binding

Malware inspection

Intrusion Detection System

Access Control List (ACL)

Table 2: Types of Firewalls

Firewall Type/Device

Description and Function

Two Examples of Commercially Available Products that Provide this Functionality

Routed Firewall

Transparent Firewall

Packet Filtering Firewall

Circuit Level Proxy

Application Level Gateway/Proxy Server

Unified Threat Management Device

All-in-One Security Appliance

Table 3- Types of Malicious Software

Name of Malicious Software

Description of Malware (Describe how program installs, what it is intended for and how it is spread)

Provide at Least Two Current (last 5 years) examples

Mitigation (List solution for countering this threat, provide a commercial example)

Virus

A computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data). Viruses require the user to run an infected program or operating system to spread.

Cryptolocker, Rombertick

Anti-virus software, Windows Defender

Worm

Trojan horse

Spyware

Ransomware

Adware

Table 4 Types of Attacks and Security Threats

Type of Network/Computer Attack and Security Threat

Description

Mitigation

Phishing

Password Stealing

Identity Theft

Dumpster Diving

Denial of Service/Distributed Denial of Service

Smurf Attacks

Buffer Overflow

Man-in-the-Middle Attacks

Packet Sniffing

FTP Bounce

War Driving

WEP Cracking/WPA Cracking

Rogue Access Points/ Evil Twin

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

From Zero To Data Hero With Chatgpt

Authors: Andrew Wu

1st Edition

B0CQRJPXD9, 979-8989523009

More Books

Students also viewed these Databases questions