wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY TOOLS

profile
Ritu Jha
Aug 27, 2022
0 Likes
0 Discussions
48 Reads

ANTI VIRUS SOFTWARE 

The most basic security program is anti- virus software. Anti - virus software periodically downloads small components known as definitions. A server that help it to identify viruses on your computer.  The disadvantage of anti - virus software is that it only deletes anti- virus software after it has been identified or downloads, and does not prevent malware from being downloaded on your computer. 

FIREWALLS 

A firewall is a filter that sits between a corporate network and the rest of the world. A firewall determines what type of traffic will be allowed to pass through the network. The firewall can potentially check the packets at all levels. 

• physical address allow or disallow traffic to certain network addresses ( only for shared media) 

• IP address allow or disallow traffic to certain network addresses. 

• Port numbers allow or disallow traffic to certain port numbers. 

▪︎ prohibit finger from outside. 

▪︎ prohibit Talnet from outside. 

▪︎ prohibit employees from accessing certain network services. 

● There are 2 types of Firewalls 

1) Software  Firewalls  

2) Hardware  Firewalls 

● Benefits of Firewall 

1) Monitors Traffic 

2) Blocks Trojans 

3) Stops Hackers 

4) Stops Keyloggers

 


Comments ()


Sign in

Read Next

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Network Forensics Tools and Techniques

Blog banner

Use case of K-means clustering

Blog banner

Europe Through My Lens

Blog banner

Traditional Unix System

Blog banner

Indian Culture and Tradition

Blog banner

Video games

Blog banner

Types of Hackers

Blog banner

Career v/s Job : Choose your passion

Blog banner

Embedded Operating System

Blog banner

Deadlock and starvation

Blog banner

Different types of scam Fraud

Blog banner

I/O Management and Disk Scheduling

Blog banner

Broken Authentication Attacks

Blog banner

Why am I never satisfied with my Life?

Blog banner

What is Spyware?

Blog banner

Memory management

Blog banner

How return on investment is defined in IT services

Blog banner

The Role of cryptography in cyber security

Blog banner

Security and E-mail

Blog banner

Virtual Memory

Blog banner

10 Unknown facts about India's Independence

Blog banner

Direct Memory Access

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Memory management

Blog banner

Blog on Smartsheet.

Blog banner

Modern Operating Systems.

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

"Life as a Part-time Student"

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Place to visit in pune

Blog banner

HR Automation : Need of the hour

Blog banner

Best password managers: Reviews of the top products

Blog banner

History of ITIL

Blog banner

Deadlock in operating system

Blog banner

Virtualization

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner