You are on page 1of 2

JONNEL L.

TALAÑA
MODULE 3
LESSON 5
Learning Activities/ Exercises

1. What have you learned on the first lesson? please elaborate (150-180 words)

I discovered through reading the first lesson that the first module contains the sole words in the first-rate
control device, a group of business tactics and features created to ensure that customer wants and
expectations are met or exceeded. Agencies can use effective control structures to make sure that tasks,
timelines, connections, contracts, and agreements adhere to requirements for the preservation of the
environment, food, and products. They take the form of a framework made up of ready-made structures,
methodologies, rules, protocols, techniques, and resources. It also defined a system for monitoring the
techniques, procedures, and jobs required to satisfy good standards and objectives.

2. Expand your understanding on firewall. Provide examples that are not on the module. (120- 150
words)

Firewalls keep an eye on activity at the ports of a computer, which are where data is shared with outside
devices. You can implement a firewall in either hardware or software form, or in a combination of both.
Firewalls prevent unauthorized internet users from accessing private networks connected to the
internet, especially intranets. Think of IP addresses as houses, and port numbers as rooms within the
house. As in "Source address 172.18. Destination 172.18 may be reached by protocol 1.1. It is a system
designed to prevent unauthorized access to or from a private network.

In networking, a device that enforces an access control policy among networks is referred to as a
"firewall." Options like a router with packet filtering, a transfer with VLANs, and numerous hosts with
firewall software can all be included in this control coverage. A firewall device may consist of a number
of different components and pieces. One of the key components of what is commonly referred to as a
firewall is visitors screening. A firewall is like the steel plate that separates the cabin from the engine in a
car or an airplane. Essentially, the term "firewall" was created for usage with computer networks; a
firewall is installed or configured on a network to prevent unauthorized users from entering or accessing
particular areas inside a network. The first firewalls were no longer standalone devices, but rather
software capabilities that were added to servers or routers to enable firewall functionality. Independent
firewalls were created by many organizations over time. Thanks to specialized firewall devices, routers
and switches were able to give up the memory- and processor-demanding job of filtering packets.
Modern routers, such the Cisco Intergrated Service Routers (ISRs), can also be used as cutting-edge
stateful firewalls for enterprises that might not need a dedicated firewall.
LESSON 6

Learning Activities/ Exercises

What have you understood on lesson 2? (150-180 words)

As I study the lesson, I understand and learn more about firewells and reliable tools. I'm
examining the phrase "Trusted System" in more detail as it pertains to information and reality
portrayal. A binary contrast is implied by the word "trust": either something is steady or it is not.
If it is stable, it should endure any assaults whether they take place right now, tomorrow, or in a
century. You have the option to accept our assertion that it is stable (and subsequently purchase
and utilize it) or reject it (and both do now no longer use it or use it however do now no longer
agree with it).If we can conclude that the code has been meticulously developed and examined,
giving us reason to believe that it does what is expected of it and nothing more, then we may
claim that software is relied upon. Usually, trusted code serves as the foundation for other
untrusted code to run.

2. Elaborate what trusted systems is all about, Provide example. (150 words)

Technology users need to be aware of best practices when utilizing the cloud. The branch of technology
known as "cyber safety" educates people about the security and safety of the gadgets they use on a daily
basis. Every security risk specifically targets the computer system and endangers its security. Therefore,
network and technology security is crucial for protecting against known hazards.

Such systems' software outlines rendering rights (the ability to view or hear information), transit rights
(the ability to copy media, lend it to other users, or transfer the license to other users), and derivative
work rights (permission to extract and reuse content from the protected work). also the Digital
Millennium Copyright Act, first sale, and digital rights management (DRM) (DMCA).

You might also like