Featured Post
The Great Gatsby2 essays
The Great Gatsby2 articles The Great Gatsby, a novel by F. Scott Fitsgerald, is about the American Dream, and the destruction of the indi...
Sunday, October 6, 2019
Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words - 2
Class student dicussions answers - Assignment Example You also provided a simple ââ¬Ëwhat to doââ¬â¢ measures in order to eliminate the risk of viruses affecting the computer. It is a good insight that you gave about training the new users on how to detect scam emails and not click on the provided unknown links, and also executing an anti-malware or anti-virus scan whenever accessing an external memory drive. You could have also added not auto-executing flash drive programs or executables. Another thing that I feel should be a part of training for novices should be proper usage of trusted sites for downloads security features available in the browsers. Brain, you defined what Kevin said. You explained how a honeypot is implemented outside the main network and it sacrifices itself for the protection of the main, critical network. The best things that you told about the honeypot networks in general, are the disadvantages of implementing them. Cost was always a default factor but yes it would take more toil on the system administrator to monitor and look after this networkââ¬â¢s resources. I would partially agree with the last comment you made on comparing advantages and disadvantages. For critical data organizations, we do need these honeypots but for smaller organizations, we cannot afford to have such a high cost. You also specifically mentioned what intrusion detection systems and firewalls we can use for information security. As opposed to Kevin, you have provided specific details on three main techniques of ensuring information security within the organization. You also made good points on differentiating how software and hardware security systems work in unison to provide maximum security to the organizational data. I completely agree that software based security is either algorithmic or rule based but hardware based security is almost rule based. The explanation of how routers work
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.