The court The Maple County court is redesigning its network to ensure more secur
ID: 3674271 • Letter: T
Question
The court The Maple County court is redesigning its network to ensure more security. The court has four Linux serves and three Windows Server systems. One of the Windows Server systems is connected to a DSL line and shares network connectivity with other computers on the court's network. The same server also has e-mail and SMTP services for handling e-mail. All of the users on the court's network have computers running Windows 7 or Mac OS X Snow Leopard and Lion. The court has an Optical Ethernet WAN connection to the Sheriff's Department and to the Maple City Police Department. There is also an Optical Ethernet WAN connection to the Maple City and County Building. The County judges are concerned about security on the Maple County network and hire you via Network Design Consultants to assess their security needs. Create a document that explains network borders to the judges and the border points security. The judges ask you to give all court employees a short seminar aboutExplanation / Answer
CASE PROJECT 11-2 SEMINAR ON ATTACKS
malicious attacks on computer can happen in various ways
They are virus attacks,spam attacks, trojan horses and bombs
Computer viruses: It is a computer program which is specially developed to destroy various kinds of information stored in computer .These information can be audio,video,and all other kinds of data.It attacks data by replicating itself by creating various copies of it in other programs or by modifying them.Such a modified or attacked data is called data infected by virus. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the software in the computer useless.
adwares:Adwares are the ones which plays, displays, or downloads advertisements . The advertisements seen are based on browser habits. Some adwares work like spyware, gathering information about the computer from its hard drive, the websites we visit, or even keystrokes. Few adwares have the capability to capture or transmit personal information.
Spyware:They gather information about a user or a organization without their knowledge and may send such information to unauthorised or other entity without user or host's consent, .
Trojan horses:These malicious computer programs misrepresents itself and appear useful, routine, or interesting in order to persuade a victim to install it.Once victim installs it most of them indirectly create harm by making paths for other viruses or any other dangerous programs to get installed easily in a system.
Bombs:These softwares stay calm till a particular time and when time comes they suddenly cause damage to system.
CASE PROJECT 11-3 SECURITY FOR THE SERVER
1)Firewall can be used in the server to keep it away from dangerous data
2)Antivirus softwares and adwares can be used
3)Encryption can be used for connections
4)Proxy servers can be used
CASE PROJECT 11-5 SPAM PROBLEM
CASE PROJECT 11-5 SPAM PROBLEM
These spam problem can be corrected by
1)Changing the E-mails forever because we get most of the spamss by E-mail.
2)We can also use spam filtering software,if we cannot change the E-mail ID.
3)Give information about these spam to the E-mail provider.For example,if yahoo is your ID provider,then give information to Yahoo about this,so that they can deal with it.
4)We can also blacklist the spammers.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.