You are on page 1of 5

[Type here]

1 . define firewall and its type

Ans. A firewall is a hardware or software device which is configured to permit, deny, or


proxy data through a computer network which has different levels of trust.
Types of firewall:-
1. Packet Filtering Firewall
2. Network firewall
3. Host-based firewall
4. Hardware firewall
5. Software firewall
6. Internal firewall
7. Distributed firewall
8. Perimeter firewall
9. Next-generation firewall (NGFW)
10. Circuit level gateway
11. Web application firewall
12. Proxy firewall
13. Stateful inspection firewall

2. Give the needs of cyberlaws

Ans. Needs of cyberlaws:-


1.Protection against Cybercrime: To safeguard individuals and organizations from
crimes
such as hacking, identity theft, phishing, and cyberstalking.
2. Data Privacy and Security: To ensure the protection of personal and sensitive data
against
unauthorized access and breaches.
3. Regulation of E-commerce: To provide a legal framework for online transactions,
protecting both consumers and businesses.
4.Intellectual Property Rights: To protect digital content, including software, digital
media,
and online publications, from piracy and unauthorized use.
5.Prevention of Cyber Terrorism: To combat and prevent attacks on national
infrastructure
[Type here]

and to address the spread of extremist content online

3.define anomaly detection


Ans Anomaly detection, refers to the process of identifying patterns in network or
system behaviour that deviate from what is considered normal. This method relies on
establishing a baseline of regular activity and then using statistical models, machine
learning, or other analytical techniques to detect deviations from this baseline.

4.whatis ISD? list their types and explain anyone


Ans : Intrusion Detection is a process of monitoring the events
occurring in a computer system or network and analyzing them for possible incident
like
violation of computer security policies and standard security practices.

Types of ISD:-
Host based IDS: This examines activity on an individual system like a mail server, web
server or an individual PC. It is concerned only with the individual system and usually
does not look in to the activity on the n/w or systems around it.
b. N/w based IDS: This examines activity on the network itself. It will monitor only the
traffic across the n/w link and usually does not look in to the activity of individual
systems.

1.The host based IDS check log files and n/w traffic coming in to or leaving a specific
post.
2.It can operate in Real time, looking for activity as it arises or batch mode, looking
for activity on a periodic basis.
3. host based systems are self contained but many new systems are designed for
reporting to and managed by a central system.
4.These systems are also taking local system resources to operate.

5.ITIL framework?
Ans The IT Infrastructure Library (ITIL) framework is a set of best practices for IT service
management (ITSM) that aims to align IT services with the needs of businesses. ITIL outlines
processes, procedures, tasks, and checklists which are not organization-specific, but can be
applied by an organization for establishing integration with the organization's strategy,
delivering value, and maintaining a minimum level of competency. It allows the organization
to establish a baseline from which it can plan, implement, and measure. It is used to
demonstrate compliance and to measure improvement
[Type here]

6. DMZ ?
Ans Demilitarized zone (DMZ): Systems or sections of a private local network that
are made publicly available and visible from outside networks such as the Internet.
Usually, a publiclyaccessible resource (such as an HTTP server) is placed on a DMZ to
protect the internal network while maintaining proper functionality for outside users.
In computer networks, a DMZ (demilitarized zone) is a computer host or small
network inserted as a "neutral zone" between a company's private network and the
outside public network. It prevents outside users from getting direct access to a server
that has company data. A DMZ is an optional and more secure approach to a firewall
and effectively acts as a proxy server as well

7.IPsec with diagram?


Ans : The IP packet contains data in text form. Hence such packets can be accessed,
read the contents & even exchange them. Higher level security such as SSL, HTTP SET
etc can be used to prevent such attacks. These protocols can enhance the protection
mechanism. But then came the requirement of securing the IP packets themselves so
that dependency on higher level protocols can be prevented.
[Type here]

8. COBIT framework?
Ans The Control Objectives for Information and related Technology (COBIT)
framework is a comprehensive IT management framework developed by ISACA
(Information Systems Audit and Control Association) to help businesses manage and
govern their information technology. Originally developed for IT auditors, COBIT has
evolved into a robust IT governance and management framework used by managers,
auditors, and IT professionals to bridge the gap between control requirements,
technical issues, and business risks
[Type here]

9.Digital certificate and it’s components?


Ans Digital certificates are electronic files. Digital certificates are issued by a third party
Known as a Certification Authority
Components of Digital certificate:-

You might also like