Monday, December 6, 2010

ASSIGNMENT

ASSIGNMENT:

1. Why was there been a dramatic increases in the number of computer related security incidents in recent yaers? (scr. Ethics in Information Technology 2nd Edition by George Reynolds p.68)

Answer: 
            I think the reason is because on the new world we have now. As years goes by lots of new technologies were invented and one is the computers. New computers and new attributes and uses can cause security incidents.

2. What are some characteristics of common computer criminals, including thier objectives.
   (scr. Ethics in Information Technology 2nd Edition by George Reynolds p.68)

Answer:
            Computer criminals are optimistic, high intelligence, consuming curiosity, and facility with intellectual abstractions. Thier objectives are to make a site that acts as a common repository for objective type questions, to cause damage to a computer system, to access confidential data on a computer system, to use a computer and etc.

3. What action must be taken in response to a security incidents.

Answer:
            In response to a security incidents we must be inform well before we do actions that can cause crime, we should be minimize using computers, promote security awareness within the company to help prevent incidents from occurring in your organization and etc.

What is a FIREWALL?

Source of image: intelligentedu.com

                 A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.
                 Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.
                 There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates.
                 A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall.
Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire.

Source: SearchSecurity.com Definitions 

Monday, November 22, 2010

My First Post

Mnf.... I don't know how to
manipulate this site....huhuhuhu...


Please help me God.

I think...ahh...I will just explore