Monday, December 13, 2010

What are some characteristic of common computer criminals including the objectives?

ANSWER : Computer crimes or cyber crimes, refers to any crimes the involves a computer and a network, where the computer may or may not played an instrumental part in the commision of a crime. net crime refers, more precisely, to criminal exploitation of the internet.Issues sorrounding  hacking. copyrights in the fringement , child pornography, and child grooming. These are also problem of privacy when confidential information is lost or intercepted, lawfully or otherwse. their only objectives is to ruined companies system and also to have money.

What are Actions Must Be Taken in Response To a Security ?

ANSWER : With regards to these so called security indicates there must be an organization that will do the job of protecting the companies product and also their name, it is because the vulnerable is getting higher and higher in which it would ruined the greater number of using these so called computer .

Monday, December 6, 2010

FIRE WALL . assingment (#2)


A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
  1. Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.
  2. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
  3. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
  4. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.