What is a hardware and or software that protects a networks resources from intrusion?

focusNode

Didn't know it?
click below

Knew it?
click below

What is a hardware and or software that protects a networks resources from intrusion?

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Vocab for my IDT class.

TermDefinition
Computer security risk Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer crime * Any illegal act involving a computer.
Cybercrime * Online or Internet-based illegal acts.
Hacker* Someone who accesses a computer or network illegally.
Cyber extortionist* Someone who uses e-mail as a vehicle for extortion.
Cyberterrorist* Someone who uses the Internet or network to destroy or damage computers for political reasons.
Virus* Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user’s knowledge or permission.
Worm* Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system.
Trojan horse* Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program.
Malware Short for malicious software; programs that act without a user’s knowledge and deliberately alter a computer’s operations.
Antivirus program Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
Bot Program that performs a repetitive task on a network.
Botnet* Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Firewalls* Hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.
Intrusion detection software Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.
Honeypot* Vulnerable computer that is set up to entice an intruder to break into it in order to allow a company to learn how intruders are exploiting its network.
CAPTCHA* Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Websites to provide further protection for a user’s password by verifying that user input is not computer generated.
Personal identification number Numeric password, either assigned by a company or selected by a user.
Digital forensics* The discovery, collection, and analysis of evidence found on computers and networks.
License agreement An agreement issued by a software manufacturer that gives the user the right to use the software.
Information theft Computer security risk that occurs when someone steals personal or confidential information.
Encryption* The process of encoding data and information to an unreadable form.
Decrypt* Process of deciphering encrypted data into a readable form.
Digital certificate* A notice that guarantees a user or a Website is legitimate.
Noise* Electrical disturbance that can degrade communications.
Power surge Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts.
Surge protector Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over voltage from reaching the computer and other electronic equipment.
Backup Duplicate of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed.
Ergonomics* The science of incorporating comfort, efficiency, and safety into the design of the workplace.
Computer ethics* Moral guidelines that govern the use of computers and information systems.
Morals A person’s standards or beliefs pertaining to their subconscious.
Intellectual property rights* Rights to which creators are entitled for their work.
Copyrights* Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Code of conduct Written guide-lines that help determine whether a specific computer action is ethical or unethical.
Spam Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
Employee monitoring The use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.


What is a hardware and or software that protects a network's resources from intrusion?

A firewall is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers who might try to break into those systems.

What is firewall and network protection?

A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

How does firewall protect your network for intrusion detection?

A firewall establishes a border between an external network and the network it guards. It is inserted inline across a network connection and inspects all packets entering and leaving the guarded network. As it inspects, it uses a set of pre-configured rules to distinguish between benign and malicious packets.
Firewall. A device or program that restricts data communication traffic to or from a network and thus protects that network's system resources against threats from another network.