Professional Documents
Culture Documents
threats or attacks.
Firewalls cannot protect against non-technical security risks, such as social engineering.
Firewalls cannot stop or prevent attackers with modems from dialing in to or out of the internal
network.
2) cybercrime, also called computer crime, the use of a computer as an instrument to further illegal
ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing
identities, or violating privacy.
Types:
Cyber Bullying
3) Packet filtering is a firewall technique used to control network access by monitoring outgoing and
incoming packets and allowing them to pass or halt based on the source and destination Internet
Protocol (IP) addresses, protocols and ports.
4)
5) public key.
private key.
Certificate Authority.
Certificate Store.
Phishing.
Vishing
Cyber Extortion
Harassment.
7)
PGP is a cryptographic method that lets people communicate privately online. When you send a
message using PGP, the message is converted into unreadable ciphertext on your device before it
passes over the internet. Only the recipient has the key to convert the text back into the readable
message on their device.
8)
Def.
An application gateway or application level gateway (ALG) is a firewall proxy which provides network
security. It filters incoming node traffic to certain specifications which mean that only transmitted
network application data is filtered.
9)
Intrusion detection systems primarily use two key intrusion detection methods: signature-based
intrusion detection and anomaly-based intrusion detection. Signature-based intrusion detection is
designed to detect possible threats by comparing given network traffic and log data to existing
attack patterns.
Type: Signature-based IDS is the detection of attacks by looking for specific patterns, such as byte
sequences in network traffic, or known malicious instruction sequences used by malware. This
terminology originates from anti-virus software, which refers to these detected patterns as
signatures.
11)
A DMZ Network is a perimeter network that protects and adds an extra layer of security to an
organization's internal local-area network from untrusted traffic. A common DMZ is a subnetwork
that sits between the public internet and private networks.
the most common examples being email, web servers, and DNS servers.
12)
copyright
Copyright refers to the legal right of the owner of intellectual property. In simpler terms, copyright is
the right to copy.
patent
Patent is an intellectual property right, to make, use or sell an invention for a limited period of 20
years.
trademark
The term trademark refers to a recognizable insignia, phrase, word, or symbol that denotes a specific
product and legally differentiates it from all other products of its kind.
13)
Or
COBIT stands for Control Objectives for Information and Related Technology. It is a business
framework that is used for the management and governance of the IT enterprise. Powered from
ISACA, Cobit packs the latest methodology in management techniques and enterprise governance.
Furthermore, it offers globally accepted practices, principles, models, and analytic tools to increase
the reliability of information systems. Its latest version is termed as COBIT 5 which is an upgraded
version of Cobit 4.1.
14 )