Sonya Leoni
06491/2008
1. data loss - destroying data on a hard drive
data manipulation - changing data for personal gain
disruption of service - overloading a server to reduce its performance
information theft - stealing data on a hard drive to gain a competive advantage
identity theft - stealing information to impersonate and usually to obtain credit
2. by- email
3. virus
4. brute force
5. spyware
6. boot the PC to your anti-virus and anti- spyware application from an external drive
7. stateful packet inspection - can look inside the packet up through layer7
website filtering - allows denies access based on a URL
simple packet filtering - allows or denies access based on an IP or MAC adderss
NAT - keeps external users from knowing the IP address used inside the network
8. integrated firewall- a feature of a network device such as a router
personal firewall - an apllication designed to protect a home PC
appliance-based firewall- a device that has the sole function of being a firewall
server-based firewall - an apllication designed to protect the enterprise network
9. -DMZ
- NAT
- SPI
10. - to create a network area that allows internal resources, such as a web server, to be accessed by external users
- to establish a network area where network resources can be shared by both internal and external users
0 komentar:
Posting Komentar