This website uses cookies to ensure you have the best experience. Learn more

Lab 7 Security Essay

896 words - 4 pages

NT1110T
Wednesday May 9, 2012
Lab 7: Security Basics

Task 1 Hardware and Software Firewalls
Barracuda Networks has a wide variety of Software and Hardware firewalls. They produce Spam and Virus firewalls protection, Web Filtering, and Barracuda Central. Barracudas Spam and Virus protection uses different methods of keeping your network secure such as 12 Defense Layers, Barracuda Reputation and Intent Analysis ,Predictive Sender Profiling, Barracuda Real-Time Protection, Triple Layer Antivirus Protection, Image Spam Protection, PDF Spam Protection, Mail Transport and Policy, and Clustering. Barracuda’s Web filtering methods include Spyware Protection, Application Blocking, Content ...view middle of the document...

Some free trials do not give you the full version trial of the software but in most cases they do. Panda and AVG antivirus programs are downloadable for free on the internet. Although being and free antivirus software program one might think it is not as good as the products you pay for, but through trial and error you can find what works for you.
2. There are many types of attacks your computer can encounter using the web. Examples are Viruses, Trojans, Spyware, malicious email attachments, and drive-by-downloads. A virus is one of the most common attacks your computer may receive. A virus’s function is to infiltrate your system and shut down certain parts of your system while gathering data. A virus is simply a coded program that has a main purpose and that is to get into your computer and do its job. Spyware is basically the way it sounds. It enters your system and attaches itself it, and it copies everything you do on your computer and reports back to the spywares owner. A Trojan basically infiltrates your computer system through a hole in the firewall and allows for a back door to be opened so that a hacker can infiltrate your computer system without your knowledge. A Trojan can also shut down your entire firewall to allow the hacker to infiltrate through the front but at the same time it can allow just about all viruses to enter your system as well. A drive-by-download is a something that most people don’t even realize has happened. Thinking that they are clicking on a single download of some type of application or a pop up window, allows viruses and malware to...

Other Papers Like Lab 7 Security

Title Is Awesome Essay

1179 words - 5 pages computer, open a new Internet browser window.
 4. In the address box of your Internet browser, type the URLhttp://www.continuitycompliance.org/security-policy-components-of-a-good-policy/ and press Enter to open the Web site. 5. Review the information to determine the components of an information systems security policy. 6. In your Lab Document, identify the major components of an information systems security policy. 7. Review the following

Assessment 4 Essay

600 words - 3 pages Assessment Worksheet Applying OWASP to a Web Security Assessment Web Security Management COM-545 Course Name and Number: _____________________________________________________ Plinio Alves Student Name: ________________________________________________________________ Manh Nguyen Instructor Name: ______________________________________________________________ 10/30/15 Lab Due Date

Construct A Linux Host Firewall And Monitor For Ip Traffic

665 words - 3 pages running on the Linux desktop. By defining what IP traffic is allowed and what IP traffic is denied, you implemented another layer of security in your overall layered security strategy. In addition, you explored some useful network management and security operation tools, which can be enabled to monitor your IP traffic and security functions. Lab Assessment Questions & Answers 1. Briefly explain how the Gufw internal Ubuntu host IP stateful

Applying Owasp to a Web Security Assessment

589 words - 3 pages Assessment Worksheet Applying OWASP to a Web Security Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the Open Web Application

Is3440 - Unit 1 Lab Assessment Sheet

503 words - 3 pages Assessment Worksheet Installing a Core Linux Operating System on a Server IS3440 - Linux Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview The

Itt 255 Lab 6

3922 words - 16 pages :  Chapter 7 Assignment 5.1 2 5 Importance of Testing, Auditing, and Monitoring 5.2 1 5.3 1 6 Role of Risk Management, Response, and Recovery for IT Systems, Applications, and Data Fundamentals of Information Systems Security:  Chapter 8 Lab 6.1 2 6.2 Assignment 4 6.3 1 16 Date: 2/12/2012 Introduction to Information Security Syllabus Graded Activities Unit # Unit Title Assigned

Itt Is3550 Legal Issues in Information Security Lab 3

660 words - 3 pages policies do you recommend to help with monitoring, enforcing, and ensuring PCI DSS compliance Gramm-Leach-Briley Act (GLBA), Payment Card Industry Standards (PCI), Data Security Standards (DSS), Federal Trade Commission (FTC) 7. What security controls and security countermeasures do you recommend for CardSystems Solutions to be in compliance with PCI DSS requirements Regularly test security systems and processes, Encrypt transmission of

Is404 Week 1 Lab

1109 words - 5 pages Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong

Network Design Proposal

1332 words - 6 pages MD Network Proposal 4 firewall security appliance will be installed to protect the private network from the Internet and provide IPSec VPN connectivity to the main UMUC office. Dell PowerEdge T310 server hardware with the Windows Server 2008 operating system will be installed for the Active Directory and Microsoft Exchange servers and as dedicated file servers for each lab. This hardware includes a RAID 5 fault tolerant, hot swappable

Lab#1 Assesment Hands-on Steps

2986 words - 12 pages reconnaissance and probing attack on the Virtual Security Cloud Lab (VSCL) • Use Zenmap GUI (Nmap) to perform an “Intense Scan” on the entire targeted VSCL infrastructure (172.30.0.0/24) • Generate a Zenmap GUI (Nmap) port scanning report and submit it as part of the deliverables for this lab Tools and sofTware Name FileZilla Server and FileZilla Client Nessus NetWitness Investigator PuTTY Tftpd32 Wireshark Zenmap GUI more INformatIoN http

Is4550 Week 5 Lab

1642 words - 7 pages ------------------------------------------------- Week 5 Laboratory: Part 1 Part 1: Assess and Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework

Related Essays

Chapter 5 Essay

272 words - 2 pages why not? No you could not. You probably couldn’t see the password for security reasons that way no one could hack into it. 6. What were the Destination IP addresses discovered by the NetWitness Investigator analysis? 2 | Lab #5 Performing Packet Capture and Traffic Analysis 7. Are packet-capturing tools like Wireshark less dangerous on switched LANs? Yes

Common Lab Tasks Essay

2403 words - 10 pages . Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you

Test Essay

379 words - 2 pages In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote

Information Systems Security Essay

4584 words - 19 pages #2: Perform a Vulnerability Assessment Scan Using Nessus Lab #3: Enable Windows Active Directory and User Access Controls Lab #4: Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) Lab #5: Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator Lab #6: Perform Business Continuity Implementation Planning Lab #7: Relate Windows Encryption and Hashing to Confidentiality and Integrity Lab #8