Monday, December 6, 2010

What is A Firewall!!


A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.
Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.
There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logos procedures and authentication certificates.
A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall.

Saturday, December 4, 2010

IT-104-Jan Mark Venida

1. why has there been a dynamitic increase in the number of computer
    related security incidents in recent years?
 (Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)
 
Ans: there are many related computer incidents because many people had uses computer and because of advance technology it is more easier for them to create or produce any kind of crime or attacts.

2. what are some characteristics of common compuetr criminals including thier objectives .
  (Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)

Ans: there are many compuetr criminals like:
      hacker - test limits of systems and gain publicity.
      craker - cause problem , steal data and corrupt system.
      insider - make money , disrupt information system.
      industrial spy - it gain competitive advantage.
      cyber criminals - to make money.
      cyber terrorist - destroy key infrastructure components.

3. what actions must be taken in response ot a security incidents.
 (Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)

Ans: EDUCATING EMPLOYEES,CONTRACTORS AND PART TIME WORKERS:
       - employees,contractor and part time workers must be educated about the importance
         of security so they will be motivated to understand and follow the security policy.