Вы находитесь на странице: 1из 2

Activity # 9

1. How can you say that Unauthorized Access is happening or has occurred?
 Unauthorized access refers to users who gain access to the data of an organization,
network, application or device without permission. Unauthorized access can occur if a
user attempts to access an area of a system they should not be accessing. And it is
closely related to authentication. Authentication is a process that verifies a user’s
identity when they access a system.
2. For you, as student taking and learning the subject (ITE-02), what do you need to put in place
to protect the network?
 I’ll make sure that my network or system is secured. I’ll place firewall, install antivirus
and other security programs which can help to detect if a hacker has slipped something
on my system that will compromise it from the inside.
3. Enumerate the eight threat actors and select 3 to defined or explain.
 Hostile nation-states – Aggressively target and gain ongoing access to public and private
sector network to compromise, steal, alter or destroy information.

 Terrorist groups – Their limited offensive cyber activity is usually disruptive or harassing
in nature. Terrorist organizations or groups mainly use the internet for communication
and recruitment.
 Hacktivists - The hacktivist is politically, socially or ideologically motivated and targeted
victims for publicity or to bring about change, which may result in high-profile
operations.
 Corporate spies and organized crime organizations
 Disgruntled insiders
 Hackers
 Natural disasters
 Accidental actions of authorized users

4. What is the objective of using a Firewall?


 It provides a barrier to control network traffic both to and from an organization’s
internet-connected network, or perhaps between different segments of an internal
network. Firewalls also provide protection against threats including Denial of Service
(DOS) attacks. DOS attacks occur when an intruder tries to barrage a corporate website
with a flood of traffic, so it carries the web server and potentially allows the intruder to
break it. From there, the intruder can access other network resources.
5. Enumerate the 3 types of firewall and differentiate each from one another.
 Edge Firewall – edge firewall protects a specific device or single computer. Easier to
configure and less expensive than firewall appliance.
 Firewall Appliance – firewall appliance protects the entire network from the outside
world. More expensive than edge firewall and harder to configure.
 Network Firewall - combination of edge firewall and firewall appliance.
6. Give your thought or idea with this statement “TO LOG OR NOT TO LOG”.
 I think it is a choice whether you log in or not. It is a bit confusing because you do not
know what to do. If you log in often, your logs will not be able to reviewed as stated in
the lesson and if you do not log in, you will not see and you have no idea how your
firewall works.

Вам также может понравиться