About Me
- anthexXx
- The boy's name Anthony \a-ntho- ny, an- thony\ is pronounced AN-tha-nee. It is of Latin origin. English form of the old Roman family name Antonius, probably of Etruscan origin. Mark Anthony (82-30 BC), Roman triumvir and general, sat on the throne and had a tempestuous political career with Queen Cleopatra of Egypt. Saint Anthony (third century) was an Egyptian hermit monk who founded the first Christian monastic order and is traditionally renowned for his resistance to the devil. According to legend, he lived alone in the wilderness for over 80 of his hundred-some years. In England, the name is usually spelled and pronounced without the "h". The German and Russian version is Anton; Antoine is French. Actors Anthony Quinn, Anthony Hopkins, Anthony Perkins, Tony Curtis, Anthony Banderas; photographer Antony Armstrong-Jones, Earl of Snowdon; composer Anton Bruckner; playwright Anton Chekhov; basketball player Anthony Mason; singer Marc Anthony.
Monday, December 13, 2010
Monday, December 6, 2010
IT-104 ANTHONY O. CORBITA
What is a firewall.
firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.
Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.
There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates.
A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall.
Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire.
SOURCE:
SearchSecurity.com Definitions
GOOGLE.COM
I WANTANSWER.COM
Sunday, December 5, 2010
IT-104 ANTHONY O. CORBITA
1. why has there been a dynamitic increase in the number of computer
related security incidents in recent years? (Src. Ethics in Information Technology
2nd Edition By Geoge Reynolds P.68)
ans>
Because as the modern technology are growing, It's indicates that many people are getting ahead of it where in they can think such as a bad doings to cause an incident that affect the cyber world. that's why the number of the computer security incidents are growing in recent years.
2. what are some characteristics of common compuetr criminals including thier objectives .
(Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)
ans>
The ff, are the characteristic of the cyber criminals and their objectives
¦-Hacker-¦
to gain publicity; ther\ir the one who limits the system of the cyber world.
¦-Craker-¦
they are the one who steal data,cost problem and curapt system.
¦-Insider-¦
to have some money
¦-industrial spy-¦
it gain competitive advantage.
¦-cyber criminals-¦
to make money.
¦-cyber terrorist -¦
destroy key infrastructure components.
it gain competitive advantage.
¦-cyber criminals-¦
to make money.
¦-cyber terrorist -¦
destroy key infrastructure components.
3. what actions must be taken in response ot a security incidents.
(Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)
ans>
,CONTRACTORS,PART TIME WORKERS AND EDUCATING EMPLOYEES:
- employees,contractor and part time workers must be educated and aware about the importance
of security or cyber security so that they will be motivated and enhance to understand and follow the security policy and stop the crimes.
ans>
,CONTRACTORS,PART TIME WORKERS AND EDUCATING EMPLOYEES:
- employees,contractor and part time workers must be educated and aware about the importance
of security or cyber security so that they will be motivated and enhance to understand and follow the security policy and stop the crimes.
Subscribe to:
Posts (Atom)