Free Essay

Nt1110 Lab 7 Security Basics

In:

Submitted By jcastellon93
Words 1060
Pages 5
Lab 7: Security Basics

Lab 7: Security Basics
Task 1: Software: We offer solutions to fit all of your security needs. | Free
Antivirus
+ Firewall | Internet
Security
Suite | Extreme
Security | Antivirus/Anti-Spyware EngineDetects and blocks viruses, spyware, Trojan horses, worms, bots, and rootkits. | | | | Two-Way FirewallMakes your PC invisible to hackers and stops spyware from sending your data out to the Internet. | | | | Advanced FirewallMonitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection. | | | | Privacy & Security ToolbarProvides site check, do not track, Facebook privacy scan, private browsing and more. | | | | Identity ProtectionMonitors your credit and alerts you of changes in your credit files. | | | | Advanced Real-Time AntivirusChecks files against an always-up-to-date cloud database of antivirus signatures. | | | | Enhanced Browser ProtectionProtects your computer by blocking web threats before they reach your browser. | | | | SupportCustomer service and technical support available 24/7 via live chat. | | | | Parental ControlsFilters and blocks inappropriate websites and limits time spent online. | | | | Threat EmulationAnalyzes downloads and warns you if a download is malicious--stopping it from infecting your PC. | | | | Find My LaptopLocates your lost or stolen laptop on a map, locks it down and recovers important files remotely. | | | | PC Tune-upOptimizes your PC for faster speed and higher performance. | | | | Automatic Antivirus signature updatesBased on hourly frequency. Plus unlimited real-time manual updates. | every
24 hours | every
1 hours | every
1 hours | | FREE! | DOWNLOAD | | Save $20 $79.95$59.95 | Try it > | | Save $20$89.95$69.95 | Try it > | |

Hardware: *
WIRELESS-N ACCESS POINTS *
MANAGED SWITCHES

There are several diffr3ences between the software and hardware firewall. The software is easy to install and cost a lot cheaper than the hardware firewall also the set-up is faster. The software firewall is easy to use for home but when running a business, hardware is the way to go. Companies don’t have time to set up each computer one by one. They buy the routers and access points and switches for their hardware firewall. That way the company just sets up all the computers with the routers and the signal. Their able to manage who uses their network.
Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions?

a. Free Versions i. AVG b. Free Trials ii. Kaspersky iii. Panda iv. Norton v. McAfee 2. Viruses and other malicious code infect a computer in one of several different ways, such as through downloaded Trojan horse programs, malicious email attachments, and drive-by- downloads. What does each of these terms mean and how do these types of infections take place?

c. Downloaded Trojan Horse Programs vi. Definition - A destructive program that masquerades as a benign application. vii. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. d. Malicious Email Attachments viii. Definition - emails that contain links to malicious web sites or have attachments containing malicious software.

ix. A suspicious or malicious email attachment is typically received from an unknown sender. The subject line or the email body typically contains a “special one-time offer” or a "call to action" to induce the recipient to open the attachment. e. Drive-By-Downloads x. Definition - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge. Unlike a pop-up download, which asks for assent (albeit in a calculated manner likely to lead to a "yes"), a drive-by download can be initiated by simply visiting a Web site or viewing an HTML e-mail message. If your computer's security settings are lax, it may be possible for drive-by downloads to occur without any further action on your part

xi. Frequently, a drive-by download is installed along with a user-requested application. (In this case, the unwanted application is sometimes called a barnacle.) For example, a file sharing program might include a spyware program that tracks and reports user information for targeted marketing purposes. An associated adware program can then generate pop-up advertisements using that information.

Task 3
1.
Full backup – All the files and folders on the drive are backed every time that specific file set is used.
Differential backup – This backup is not supported in Backup. Provides a backup of files that have changed since a full backup was performed.
Incremental backup – Provides a backup of files that were changed or are new since the last incremental backup.
2. In case the backup get corrupted and in turn corrupts the computer, it is tested off-site in case it does get corrupted so it doesn’t harm the initial computer.
3.
Cold sites – A site that is little more than an appropriately configured space in a building.
Warm sites – A site that is already stocked with hardware representing a reasonable copy of your data center.
Hot sites – Site that has a virtual image of your current data center, with all the systems configured and waiting only for the last backups of the user data from the off-site storage facility.
Most expensive – Hot sites

Task 4: 1. Password a. J@ck@$$.m0v!3 b. H3110.k!tty c. 0|-|.my.8@rd d. 4e@nut.bu773r e. ch@r113 2. Phrases f. When life gives you lemons, make lemonade i. Wl8y1m1 g. Life isn’t measured by the breaths we take but by the moments that take our breaths away ii. L!mbtbwtb2tmt2oba h. I really really really really really like you iii. !r23456Ly i. All right chums, time’s up, let’s do this iv. @rc7U1d7 j. Stick to the plan! Stick to the plan!! v. S77p2s77p 3. Password Meter Test k. J@ck@$$.m0v!3 vi. 100% l. H3110.k!tty vii. 100% m. 0|-|.my.8@rd viii. 100% n. 4e@nut.bu773r ix. 98% o. ch@r113 x. 52% p. Wl8y1m1 xi. 63% q. L!mbtbwtb2tmt2oba xii. 100% r. !r23456Ly xiii. 95% s. @rc7U1d7 xiv. 85% t. S77p2s77p xv. 96%

Similar Documents

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Free Essay

Student

...Frank Epps Ms.Easterlings NT1110 May 4, 2015 Lab 7: Security Basics Task 1 Hardware Firewalls-Wired Routers, Broadband Gateways, and Wireless routes They are protecting and entire network Source-http://www.wisegeek.com/what-are-the-different-types-of-hardware-firewall.htm Software Firewalls-Zonelabs Zone-Alarm They are used for only home-use. Source-http://www.webopedia.com/DidYouKnow/Hardware_Software/firewall_types.asp Task 2 1. All have trial versions Panda- Free Versions Norton-Trial Versions McAfee-Trial Versions AVG-Free Versions Kaspersky-Trial Versions 2. Trojan horse program- A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Source- http://searchsecurity.techtarget.com/definition/Trojan-horse Malicious email attachments- These emails can often contain links to malicious web sites or have attachments containing malicious software. Source- http://www.makeitsecure.org/en/malicious-email-attachments.html Drive-by-downloads- A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or “exploit”) a browser, app, or operating system that is out of date and has a security flaw. Source- https://blogs.mcafee...

Words: 379 - Pages: 2

Premium Essay

Nt 1210

...SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical...

Words: 4400 - Pages: 18

Premium Essay

Module 3 Essay

...Syllabus NT1210 Introduction to Networking SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances...

Words: 4795 - Pages: 20

Premium Essay

Unit

...technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure and/or support a site LAN (local area network, wired or wireless) General network user...

Words: 6762 - Pages: 28

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44