Complete Security Solutions Your neighbor started a new cons
Complete Security Solutions
Your neighbor started a new construction business. He would like to hire you to set up his new computers. His business will use the Internet to communicate with clients via email, store backups of data, and access cloud-based accounting software. The office will include two networked computers, which will share a printer and an Internet connection. In addition, he will use a tablet so that he can access the cloud-based accounting software using Wi-Fi. Because of security concerns with using the Internet, he first would like you to install a program(s) designed to protect his computers from various security threats.
Do this: Use the web to find answers to the following questions. What types of security threats exist on the Internet that could impact his business? What types of security measures should he use? Evaluate two programs that provide a comprehensive security solution. What are the programs’ functions? What are their costs? Do the services charge subscription fees in order to receive automatic updates? Which would you recommend? Why?
Solution
The 10 examples of threats to informatioon security are:
1.A virus that can delete files
2.A worm than can replicate itself that can delete all the fils
3.trojan:A kind of script that runs into the computer which compormises it
4.multipartite virus-it s a combination of various viruses.
5.boot sector virus that attcks the boot sector of hard disk
These 5 come under the category of Malware
6.SQL injection attack:It is used to steal the details of a person by forcing him to enter his details
7.Man in the middle attack where a person can read all conversation between 2 people.
8.Denial of service attack:The user does not get the resources to perform tasks.
9.SPoofing:Changing the adrdress of the packet beign transfered
10.Buffer flow attack:sending more data to receiver than its buffer size
There are many ways to handle such attacks.These include an intrusion detection system that find intruders and disconnect them instantly from the network.Another one is a firewall.that allows data to pass through only which satisfies the standards.The encryption of data should be strong which is difficult to break into.The computers must have security to prevent virus and also kill worms instantly.This makes sure the network remains safe and no external agents can ruin the network.This ensures secrecy,privacy of data.Another important technology is anti-spyware software that can immediately kill the worms whenever they are encountered.This tells the user instantly to kill the worms.
The last year security techniques may not be sufficient to protect today\'s computer security problems.This is because the number of security attacks are increasing and new types of attacks are being launches by the hacker.This ensures the company must update the last year\'s software to handle new exceptions.For example the mcafee antivirus didnt handle trojans and botnets earlier but now they can handle both .This has happened with the progress in the field of network security.This helps to protect the computers in a big way and it makes sure the data is not being misused by any hacker and that they cannot acces data illegally.
To buy best of the best,we must do a survey online and look at the reviews of the customers which anti virus to be bought.The best is the latest software with all the latest features which can help to kill virus and all types of malware.Example norton antivirus 2016 is latest and best of the best in the market.Other softwares are outdated and cannot handle the new kinds of malware.We should buy the one which can handle all types of attacks
A distributed denial-of-service (DDoS) attack is an attack which occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. This is a serious attack and stop the users from accessing the resources.This attack is often the result of multiple compromised systems flooding the targeted system with traffic.It takes place in the following ways.
It occurs when an attacker floods\"a network with information.This can happen when we type a URL for a particular website into your browser, we are sending a request to that site\'s computer server to view the page.The next step is that the server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can\'t process your requests.This shows how overloading a server with multiple requests can cause a DDOS attackleading to disruption of web services.
A buffer overflow, or buffer overrun, is an attack in which a program, while writing data to a buffer, overruns the buffer\'s boundary and overwrites adjacent memory locations. This is a special case of the violation of memory safety.The data overflows and becomes corrupted.In order to prevent buffer overflow we must:
The first step is that if our language choices are equally split between one that allows direct memory access and one that doesn\'t , then we must choose the one that doesn\'t. This means that we should ,use Perl, Python, Lisp, Java, etc over C/C++. This isn\'t always an option, but it does help prevent us from launching this attack.The second way to prevent is that in the programming languages where we have direct memory access, if classes are available that handle the memory for us like std::string, use them.We should use well exercised classes to classes that have fewer users. This is because more use means that simpler problems are more likely to have been discovered in regular usage.
The next way is to use a compiler like ASLR and DEP.We should also use any security related compiler options that our application offers. This won\'t prevent buffer overflows, but will help mitigate the impact of any overflows
The two solutions are being compares as follows:
1.Norton antivirus that provides security from virus,malware and kills them instantly.This is complete solution.They cost less then 100$ and can be installed for a year. They are very good to use.It provides autmatic updates which can be installed instantly over the internet to handle new types of attacks
2.Another solution is mcaffe firewall which stops unwanted trafiic and immedietaley scans and kills malware.It is of 40$ and is good and provides automatic updates too.
I prefer norton because it scans computer all the time and if a site infected with malware is opened it imemdiately brings to the notice of the user.The user can kill it ana immediately can get rid off the virus.This keeps the computer secure .This helps to keep overall security.

