wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY TOOLS

profile
Ritu Jha
Aug 27, 2022
0 Likes
0 Discussions
48 Reads

ANTI VIRUS SOFTWARE 

The most basic security program is anti- virus software. Anti - virus software periodically downloads small components known as definitions. A server that help it to identify viruses on your computer.  The disadvantage of anti - virus software is that it only deletes anti- virus software after it has been identified or downloads, and does not prevent malware from being downloaded on your computer. 

FIREWALLS 

A firewall is a filter that sits between a corporate network and the rest of the world. A firewall determines what type of traffic will be allowed to pass through the network. The firewall can potentially check the packets at all levels. 

• physical address allow or disallow traffic to certain network addresses ( only for shared media) 

• IP address allow or disallow traffic to certain network addresses. 

• Port numbers allow or disallow traffic to certain port numbers. 

▪︎ prohibit finger from outside. 

▪︎ prohibit Talnet from outside. 

▪︎ prohibit employees from accessing certain network services. 

● There are 2 types of Firewalls 

1) Software  Firewalls  

2) Hardware  Firewalls 

● Benefits of Firewall 

1) Monitors Traffic 

2) Blocks Trojans 

3) Stops Hackers 

4) Stops Keyloggers

 


Comments ()


Sign in

Read Next

CYBER SECURITY CHALLENGES

Blog banner

A buffer overflow

Blog banner

social media issue

Blog banner

Data Science in Mental Health Prediction

Blog banner

I/O Buffering

Blog banner

Data Security must be your Priority!

Blog banner

Health is Wealth

Blog banner

Understanding - Proof of Work!

Blog banner

Interesting fact about kangaroo.

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Security requirements for Safe E-Payments

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Deadlock and Starvation

Blog banner

security requirements for safe e-payment

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

internet email and it's applications

Blog banner

Policies for Service Transition

Blog banner

Processing Crime and Incident Scenes

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Modern Operating Systems

Blog banner

Yahoo! mail

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Zoho

Blog banner

Synchronization

Blog banner

Hey Aryan here

Blog banner

Cache memory

Blog banner

Fault Tolerance

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Deadlock in Operating systems

Blog banner

Deadlock and starvation

Blog banner

OLA

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Virtual Memory

Blog banner

Strengthening Active Directory Security

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

John Titor: The Time Traveler

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Social Media Sentiment Analysis

Blog banner

Short note on Microsoft office

Blog banner