StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Class student dicussions answers - Assignment Example

Cite this document
Summary
They are a resource in the network that is used for sacrificial protection of the main network. They may be of real help to the network administrators since it can help them to monitor all the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Class student dicussions answers
Read Text Preview

Extract of sample "Class student dicussions answers"

RESPOND TO OTHER DISCUSSION POSTS s College RESPOND TO OTHER DISCUSSION POSTS Kevin, you are spot on with your brief definition of a honeypot in the network. They are a resource in the network that is used for sacrificial protection of the main network. They may be of real help to the network administrators since it can help them to monitor all the intended malicious activity and attacks planned by the hackers. This can be really fruitful in anticipating future attacks and preparing preventive strategies.

Also, you summarized the two types nicely. I would probably say that despite being expensive, larger data – critical organizations should look to implement research honeypots since it goes a step ahead and provides contingency measures for potential threats. You also provided a simple ‘what to do’ measures in order to eliminate the risk of viruses affecting the computer. It is a good insight that you gave about training the new users on how to detect scam emails and not click on the provided unknown links, and also executing an anti-malware or anti-virus scan whenever accessing an external memory drive.

You could have also added not auto-executing flash drive programs or executables. Another thing that I feel should be a part of training for novices should be proper usage of trusted sites for downloads security features available in the browsers.Brain, you defined what Kevin said. You explained how a honeypot is implemented outside the main network and it sacrifices itself for the protection of the main, critical network. The best things that you told about the honeypot networks in general, are the disadvantages of implementing them.

Cost was always a default factor but yes it would take more toil on the system administrator to monitor and look after this network’s resources. I would partially agree with the last comment you made on comparing advantages and disadvantages. For critical data organizations, we do need these honeypots but for smaller organizations, we cannot afford to have such a high cost.You also specifically mentioned what intrusion detection systems and firewalls we can use for information security. As opposed to Kevin, you have provided specific details on three main techniques of ensuring information security within the organization.

You also made good points on differentiating how software and hardware security systems work in unison to provide maximum security to the organizational data. I completely agree that software based security is either algorithmic or rule based but hardware based security is almost rule based. The explanation of how routers work is amazing and would even urge the layman, simulate a network in his mind as a water ship!Dustin has provided some more insights on how viruses work, what are their different types and how can you detect if your computer is infected with a virus or not.

I may not agree with all the symptoms list though because slow performance can be also because of not enough free memory or I/O locks. Erratic behavior might be because of buggy application too and data losses occur mostly because of sniffing attacks. Only frequent crashes can be fully associated with the malicious activity of the entering virus. Spyware is a growing potent threat and an anti-spyware should be installed by users who uses internet. Internet is the prime breeding ground for spywares as we don’t really have them on private intranets or local FTP’s.

Thus, spywares are web-based and used mostly by hackers or sniffers to steal information. They may not affect how computer behaves but might trigger a Denial of service attack on a website.Brain, your explanations connect the points and tells how viruses, web and other malicious code work together. Good computing practices would include trusted downloads and monitoring malicious execution of services from Task Manager. Your personal experience is a good source of enlightenment. I still remember those retro viruses and I lost my all partitions.

The only difference was the fact that I was using AVG instead of Norton. I didn’t move the files to quarantine and deleted the anti-virus protection shield files. The virus soon destroyed my data and I had to do the same, reformat. The best remedy is to report these detected viruses or maybe change the registry values to defaults. Another important comment set is those about spyware and tracing cookies. I guess this problem is solved now since most browsers provide incognito browsing which is the best way to avoid tracing cookies.

I would still say that network engineers and web developers have got their work cut out in dismantling hackers and only continuous technology innovation can help in this regard.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Retrieved from https://studentshare.org/information-technology/1610256-class-student-dicussions-answers
(Class Student Dicussions Answers Assignment Example | Topics and Well Written Essays - 500 Words - 2)
https://studentshare.org/information-technology/1610256-class-student-dicussions-answers.
“Class Student Dicussions Answers Assignment Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1610256-class-student-dicussions-answers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Class student dicussions answers

Link Between Academic Success and a Students Perceived Self-worth

Students will then be more willing to work for answers to higher order questions dealing with the why and how.... Secondly, teachers should react to responses in such a way as to encourage student answers.... Incorrect answers based on a lack of knowledge should be met with prompts and hints that may engage the needed information.... In the research paper “Link between academic success and a student's perceived self-worth” the author tries to understand how the dynamics of student-teacher interactions play a key role in the formation of self-worth by these same students....
3 Pages (750 words) Essay

Instructional presentation

Students will then be more willing to work for answers to higher order questions dealing with the why and how.... econdly, teachers should react to responses in such a way as to encourage student answers.... Incorrect answers based on a lack of knowledge should be met with prompts and hints that may engage the needed information.... If it is important to receive correct answers from individuals, revisiting might prove useful....
2 Pages (500 words) Essay

Learning and Individual Differences

The term paper "Learning and Individual Differences" states that Special needs are requirements that occur naturally in people thereby necessitating particular attention on them.... They may be psychological or medical.... They usually lead to problems in learning for students.... nbsp;… The difficulties that some students experience in learning is normally not associated with mental disability....
11 Pages (2750 words) Term Paper

Oral Participation in Class

It is important to explore class participation from the perspective of a student, as it a source of providing firsthand knowledge about their perception and feelings.... These factors can be the gender differences, student's age, their particular ethnicity, student's willingness and motivation to talk, their interest in topic, their emotions like fear or confidence, student-teacher relations, class size, etc.... that play important role in oral participation and academic achievement of a student....
6 Pages (1500 words) Admission/Application Essay

A Teaching Focus Area

From the paper "A Teaching Focus Area" it is clear that in the Constructivist theory the emphasis is placed on the learner or the student rather than the teacher or the instructor.... hellip; Observing the class in action has provided much learning to the observers.... bservations were done in a Year 8 science class.... The class was studying a unit on Magnetism and the class session observed is a continuation of discussions on the topic from the day before....
8 Pages (2000 words) Coursework

Improving Quality of Teaching and Learning

It is expected that our schools impart good quality education using a broad and balanced curriculum and well-defined route for student excellence.... The quality of teaching is assessed by the current study using five areas like –Lesson Planning as an essential aspect of a successful class the lesson plans provide the teacher with a clear and objective target for each class (Wolfe, 2006) and help them to include all the essential points of the topic (Salsbury and Schoenfeldt, 2008)....
8 Pages (2000 words) Assignment

Demystification of Social Media as a Learning Avenue and Source of Education

The paper "Demystification of Social Media as a Learning Avenue and Source of Education" proposes the plan is to guide the student to realize the effects of social media.... hellip; As a tutor, I would walk around to get their feel of the subject, answering their questions in the groups around the classroom 8:50-8:55- Question and answer sessions as I give the students quick questions on 8:00-8:10-gauge how much the students know about social media by asking them questions on what each student knows in brief....
7 Pages (1750 words) Research Proposal

The Concept of Learning Process

… 03 June 2006The Learning Process: How A Teacher is Aware Students are LearningThe concept of learning is a multifaceted process, one that depends upon the student, teacher, and parents to ensure the proper environment is in place for students to 03 June 2006The Learning Process: How A Teacher is Aware Students are LearningThe concept of learning is a multifaceted process, one that depends upon the student, teacher, and parents to ensure the proper environment is in place for students to reach their educational goals....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us