logo

Introduction to Cyber Crime Week 5

   

Added on  2023-05-30

6 Pages843 Words323 Views
Running Head: INTRODUCTION TO CYBER CRIME WEEK 5 0
INTRODUCTION TO CYBER CRIME WEEK 5
(student name)
12-5-2018
Introduction to Cyber Crime Week 5_1
INTRODUCTION TO CYBER CRIME WEEK 5 1
Contents
Discussion 1.....................................................................................................................................2
Firewalls versus encryption.........................................................................................................2
References........................................................................................................................................3
Discussion 2.....................................................................................................................................4
Digital Crime and Digital Terrorism...........................................................................................4
References........................................................................................................................................5
Introduction to Cyber Crime Week 5_2
INTRODUCTION TO CYBER CRIME WEEK 5 2
Discussion 1
Firewalls versus encryption
In order to secure the digital information, the discussion takes place if firewall protection
is better or encryption protection. Encryption protection is useful for preserving the integrity of
data, it increases the confidentiality, this protection system has a fundamental role while VPN
has to be enabled, and it is dependent on user authentication. This system basically, scramble the
information to make sure that only authorized party can access it and the unauthorized member
cannot steal it.
Whereas, the firewall is a product, which includes both hardware and software, and is
located at the edge of an organization’s network to connect to the internet. This protection
system uses various techniques like filtering and techniques that include passwords to make sure
that no unauthorized traffic is getting into the network of the customer (Keefe, White, & Dennis,
2015).
In my opinion, digital information can be secured more while using firewall protection
because it automatically detects and filter the authorized and unauthorized traffic and restricts
unauthorized traffic to get into the network. The reason being various benefits of this system is
preventing attacks on organization private network by various other networks worldwide. the
system allows the company to define a funnel, and keep unauthorized user aside. Moreover, this
protection is allowed to monitor the security of the computer and network of the company,
whenever a suspicious activity is observed, an alarm will be generated. This system is providing
monitoring and recording services using the file transfer protocol and the World Wide Web
(Touboul, 2016).
Introduction to Cyber Crime Week 5_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Secuirty
|5
|883
|29

Lucent pharma - Assignment
|34
|4666
|75

Network Design Proposal for XYZ Retails
|15
|873
|395

Sample Assignment on Cyber Security
|9
|2344
|38

Developing Information Security Policies for Xero
|14
|4396
|167

MGMT6013 Managing Information System | Security Policy
|14
|4311
|36