Monday, December 6, 2010

ASSIGNMENT # 2





A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.











ASSIGNMENT!!!!!!!!!!

Why has there been a dramatic increase in the number of computer related security incidents in recents year?
There was a telling moment in 2004, during one of the presidential campaign debates. Tim Russert, the moderator, asked eight or nine questions about Social Security, trying to put the candidates on the spot, while asking not once about Medicare, which serious people – as opposed to Serious People – know is the real heart of the story.

What are some characteristics of common computer criminals including their objectives?
  • Hacker
  • Cracker
  • Insider
  • Industrial spy
  • Cyber Terrorist
What action must be taken in response to a security incidents?
Many organizations learn how to respond to security incidents only after suffering attacks. By this time, incidents often become much more costly than needed. Proper incident response should be an integral part of your overall security policy and risk mitigation strategy.