Monday, December 6, 2010

ßååååå ASSIGNMENTôô♪♠♦↓╔

ASSIGNMENT:
 
  1. Why was there been dramatic increase in the number of computer related security incedents in recent years? (Src. Ethics in Information Technology 2nd Edition by George Reynoldds p. 68)
     The dramatic increase in computing speeds has added to the dilemma because ... Peter Stephenson has been a network consultant and lecturer for 18 years, special- ..... of a Computer Security Incident.” Here we will be very specific about the ... There is no single, easy profile of cyber crime or the cyber criminal. ...
2. What are Some Characteristics of Common Computer Criminals.
   Including their objectives including their?
 This is the characteristics of Computer Criminals :\
           Spam ,Fraud ,Obscene or offensive content ,Harassment ,Drugtrafficking, Cyberterrorism,
    Cyber warfare.

3. What action must be taken in response to a security incedents.

      A great deal of damage has been done to organizational reputations and a great deal of information has been lost in organizations that do not have fully effective incident response programs in place.  Without an incident response plan, an organization may not discover an attack in the first place, or, if the attack is detected, the organization may not follow proper procedures to contain damage, eradicate the attacker’s presence, and recover in a secure fashion.  Thus, the attacker may have far higher impact on the target organization, causing more damage, infecting more systems, and possibly exfiltrating more sensitive data than would otherwise be possible with an effective incident response plan.

What is FIREWALL? ♫







WHAT IS FIREWALL?

Firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:
  1. Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.
  2. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
  3. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
  4. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.