Reference no: EM131110199
Personal firewalls and related tools
Part 1:
Preparation: Install a firewall that you already know or use your own OS firewall tool. There are many firewalls freely available. The article ‘Personal Firewall Reviews' (Markus, 2013) provides some examples and ideas. The whole group should not use the same personal firewall. Discuss each individual member's choice of the personal firewall and provide some justification for the decision. Test the personal firewalls you each selected with an invited attack. You can then visit a Web site that will perform a controlled invited attack, for example, the Gibson Research Corporation (2014).
Create a report: Briefly summarise what personal firewalls can do and what they cannot do to protect your personal computer. Present one potential benefit that you get from installing a personal firewall; something that you cannot do without it. Report your findings from the invited attack on your firewalls. Distinguish between the function of a personal firewall and that of antivirus software, anti-spyware software and their relationship to personal firewalls.
Part 2:
Preparation: Download and install any security-related tools package. Some possible examples include (but you are not limited to):
Microsoft Windows Sysinternals site (Microsoft, 2014)
Fport for Windows from the McAfee site (McAfee, 2014)
Lsof for Linux from the Free(code) site (Abell, 2013)
Other tools from the CHIHT site (ENISA, 2014, see the proactive tools section)
Create a report: Describe your experience working with your chosen security-related tools. Analyse which aspects of the tools will be useful for security purposes for experts and for normal users. Submit your report (both Part 1 and Part 2) to the Turnitin link by the end of Week 6.
References:
Abell, V. (2013) Lsof [Online]. Available from: https://people.freebsd.org/~abe/
ENISA. (2014) Clearinghouse for incident handling tools [Online]. Available from:
https://www.enisa.europa.eu/activities/cert/support/chiht
Gibson Research Corporation. (2014) Welcome to ShieldsUP! [Online].
https://www.grc.com/x/ne.dll?bh0bkyd2
Markus, H.S. (2013) 'Personal firewall reviews', Home PC Firewall Guide [Online].
https://www.firewallguide.com/software.htm
McAfee. (2014) Fport v2.0 [Online]. Available from:
https://www.mcafee.com/us/downloads/free-tools/fport.aspx
Microsoft (2014) Sysinternals security utilities [Online]. Available from:
https://technet.microsoft.com/en-us/sysinternals/25e27bed-b251-4af4-b30a-c2a2a93a80d9.aspx
Change the degree of the local polynomial
: Change the degree of the local polynomial in Cleveland's method to 0 (locally constant) using the argument degree (see Comment 8). Using the cars data from Problem 1, how does changing the degree affect the estimates compared to the locally linear..
|
Do you think main street fairness act will ever become law
: If you were a Senator, which law(s) would you have voted for/against? Explain your reasoning. Do you think the Main Street Fairness Act will ever become law? Explain your position
|
What is the goal of government regulation of business
: What is the goal of government regulation of business? By whom are administrative agencies run? How long do these individuals serve
|
What sort of recruitment campaign would you suggest
: What sort of recruitment campaign would you suggest to increase the number of minority applicants? Discuss advertising and other approaches to this topic
|
Briefly summarise what personal firewalls can do
: Describe your experience working with your chosen security-related tools. Analyse which aspects of the tools will be useful for security purposes for experts and for normal users.
|
Comment on the graphical comparison of the estimates
: Comment on the graphical comparison of the estimates obtained with the two automatically selected spans in Problem 13 to the estimate obtained in Problems 5 and 6 using Friedman's method with cross-validation span and an appropriate value for the ..
|
How can other sounds be used in alice
: How can other sounds be used in Alice?
|
Method to canadian wage data
: Apply Cleveland's method to Canadian wage data from Problem 5. Obtain an estimate using a span found by trial and error. Then obtain estimates using the two cross-validation span selectors. Comment on the graphical comparison between these estimat..
|
Which payment method should dr jackson accept
: Dr. Bob Jackson owns a parcel of land that a local farmer has offered to rent for the next 10 years. Which payment method should Dr. Jackson accept if his required rate of return is 10 percent
|