You are on page 1of 4

1) Firewalls cannot stop users from accessing malicious websites, making it vulnerable to internal

threats or attacks.

Firewalls cannot protect against the transfer of virus-infected files or software.

Firewalls cannot prevent misuse of passwords.

Firewalls cannot protect if security rules are misconfigured.

Firewalls cannot protect against non-technical security risks, such as social engineering.

Firewalls cannot stop or prevent attackers with modems from dialing in to or out of the internal
network.

Firewalls cannot secure the system which is already infected.

2) cybercrime, also called computer crime, the use of a computer as an instrument to further illegal
ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing
identities, or violating privacy.

Types:

Cyber Bullying

Online Job Fraud

3) Packet filtering is a firewall technique used to control network access by monitoring outgoing and
incoming packets and allowing them to pass or halt based on the source and destination Internet
Protocol (IP) addresses, protocols and ports.

4)
5) public key.

private key.

Certificate Authority.

Certificate Store.

Certificate Revocation List.

Hardware Security Module.

6)Email and internet fraud.

Phishing.

Vishing

Cyber Extortion

Harassment.

7)

PGP is a cryptographic method that lets people communicate privately online. When you send a
message using PGP, the message is converted into unreadable ciphertext on your device before it
passes over the internet. Only the recipient has the key to convert the text back into the readable
message on their device.

8)

Def.

An application gateway or application level gateway (ALG) is a firewall proxy which provides network
security. It filters incoming node traffic to certain specifications which mean that only transmitted
network application data is filtered.

9)

Kerberos provides a centralized authentication server whose function is to authenticate users to


servers and servers to users. In Kerberos Authentication server and database is used for client
authentication. Kerberos runs as a third-party trusted server known as the Key Distribution Center
(KDC).
10)

Intrusion detection systems primarily use two key intrusion detection methods: signature-based
intrusion detection and anomaly-based intrusion detection. Signature-based intrusion detection is
designed to detect possible threats by comparing given network traffic and log data to existing
attack patterns.

Type: Signature-based IDS is the detection of attacks by looking for specific patterns, such as byte
sequences in network traffic, or known malicious instruction sequences used by malware. This
terminology originates from anti-virus software, which refers to these detected patterns as
signatures.

11)

A DMZ Network is a perimeter network that protects and adds an extra layer of security to an
organization's internal local-area network from untrusted traffic. A common DMZ is a subnetwork
that sits between the public internet and private networks.

the most common examples being email, web servers, and DNS servers.
12)

copyright

Copyright refers to the legal right of the owner of intellectual property. In simpler terms, copyright is
the right to copy.

patent

Patent is an intellectual property right, to make, use or sell an invention for a limited period of 20
years.

trademark

The term trademark refers to a recognizable insignia, phrase, word, or symbol that denotes a specific
product and legally differentiates it from all other products of its kind.

13)

A framework for alignment and governance. COBIT is an IT management framework developed by


the ISACA to help businesses develop, organize and implement strategies around information
management and governance.

Or

COBIT stands for Control Objectives for Information and Related Technology. It is a business
framework that is used for the management and governance of the IT enterprise. Powered from
ISACA, Cobit packs the latest methodology in management techniques and enterprise governance.
Furthermore, it offers globally accepted practices, principles, models, and analytic tools to increase
the reliability of information systems. Its latest version is termed as COBIT 5 which is an upgraded
version of Cobit 4.1.

14 )

Mala pn ny mahit bhetl tr sanga

You might also like