Preview

MIS 320 Midterm

Good Essays
Open Document
Open Document
3629 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MIS 320 Midterm
Chapter 7:
What are the most important tools and technologies for safeguarding information resources?
Name and describe three authentication methods.
Authentication refers to the ability to know that a person is who he or she claims to be. Passwords known only to the authorized users. Token is a physical device that is designed to provide the identity of a single use. Smart card is a device that contains a chip formatted with access permission and other data.Biometrics is based on the measurement of a physical or behavioral trait that makes each individual unique.

Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.
Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.

Describe the role of encryption and digital certificates in a public key infrastructure.
Digital certificates combined with public

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fi 360 Midterm

    • 1827 Words
    • 8 Pages

    2. Which of the following is a valid criticism concerning the goal of firms to maximize profits? (Points : 2)…

    • 1827 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Acco 310 Midterm

    • 1559 Words
    • 7 Pages

    Which of the following criteria must be met before an event or item should be recorded for accounting purposes?…

    • 1559 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    My firewall may be effective at blocking some attacks and offering a certain amount of protection. But a firewall does not guarantee that your computer will be attacked. In particular, a firewall offers little to no protection against viruses. However using a firewall in conjunction with other protective software and safe practices will strengthen resistance to attacks. Anti-virus software details vary between packages but basically it scans files on your computer’s memory for certain patterns that may indicate an infection, looking for signatures, or definitions, of known viruses. Authors for viruses are continually being updated and released, so it’s important you have the latest definitions installed so the software can tackle any threat new or old. Each virus software has its own method of response once it locates a virus, and the action may vary according to when it finds the virus either during an automatic or a manual scan. Most software produces a dialog box alerting you if it has found a virus and asks whether you want it to clean the file or remove it. Some software may attempt to remove the virus without first asking. A good user should familiarize themselves with the features so they know how to handle such a…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Anti-malware can protect the computer from harmful software and this therefore speeds up the PC as harmful software can also slow down the PC. Many anti-malware software comes with other features that can speed up the PC…

    • 1180 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall restricts access to your network by filtering and blocking packets based on the sender's and receiver's Internet Protocol addresses. A proxy firewall acts as an intermediary between a client and a server, and it retrieves information and sends to the client. A proxy firewall uses stateful inspection technology to monitor incoming information and restricts network packets through the firewall. A firewall uses network address translation or NAT to assign IP addresses to each device which is connected to your network and makes it harder for hackers to break the network security.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays