it jonathan gabisan
masayahin,mabait,mapagmahal,mapagbigay,at mapag alaga
Monday, January 17, 2011
Monday, December 6, 2010
IT 104 jonathan
Why has there been a dramatic increase in the number of computer related security incident in recent year?
1. Because of the increase and proliferation of hackers, Cracker and other attackers .they can attack the information system.And also having due to poor system design or implementation .
What are some characteristics of common computer criminals. including their objectives.
1. some of character computer crime like the Asperger syndrome appear more common of computer hacker,those who has explore and tinker with computer that is for some computer criminals.
What actions must be taken in response to a security incident.
1.In our life we need to experience about the crime prevention and we need to have some action to do.we have response to the gamut of incident,criminals incident.we must developed incident response for good to us.every incident must have action plan. most initial response operation are not captured with IAP .how ever if have incident involves hazardous material. we by using monitoring and detection measure with prompt entervention
1. Because of the increase and proliferation of hackers, Cracker and other attackers .they can attack the information system.And also having due to poor system design or implementation .
What are some characteristics of common computer criminals. including their objectives.
1. some of character computer crime like the Asperger syndrome appear more common of computer hacker,those who has explore and tinker with computer that is for some computer criminals.
What actions must be taken in response to a security incident.
1.In our life we need to experience about the crime prevention and we need to have some action to do.we have response to the gamut of incident,criminals incident.we must developed incident response for good to us.every incident must have action plan. most initial response operation are not captured with IAP .how ever if have incident involves hazardous material. we by using monitoring and detection measure with prompt entervention
ITb 104 jonathan gabisan
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.
Saturday, November 20, 2010
Subscribe to:
Posts (Atom)