Analyzing Network Security: Routers, Switches, Firewalls, and Threats

Verified

Added on  2023/06/05

|8
|530
|103
Homework Assignment
AI Summary
This assignment solution provides an overview of network security, focusing on key components such as routers, switches, and firewalls, and addressing potential threats like Trojan horses and computer viruses. It highlights the importance of routers in ensuring web service availability and switches in establishing connections between computers. The solution differentiates between edge and internal firewalls and discusses the operational mechanisms of Trojan horses, including their ability to record user activities and steal sensitive information. Furthermore, it outlines the damaging effects of computer viruses, which can corrupt boot sectors, email attachments, and executable codes. To mitigate these threats, the solution recommends installing and regularly updating anti-virus software and maintaining up-to-date working structures to defend against Trojan horse attacks. Desklib provides access to this and other solved assignments to aid students in their studies.
Document Page
Network security
Student Name
Affiliation
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Innovations
The real piece of advancement is
execution [1].
While the sparks to outline prosperity
frameworks vacillate, most goals can be
taken after to two focus purposes: cost-
saving and quality change.
System prosperity frameworks and nation
recuperating office frameworks are more
run of the mill and have a more attracted
out history mastermind ask about.
Document Page
Routers, Switches and Firewall
Routers
This is the chief contraption in some random system
framework that guarantees accessibility of web
administrations [2].
Switches
Switches are the PC organizing gadget that is use in
guaranteeing association between two PCs.
Firewalls
There are two sorts of hardware firewalls: edge
firewalls and inside firewalls[4].
Document Page
Potential issues
Trojan horse:
This is any poisonous PC program which
misleads customers of its real point. It conceals
malware in a commonplace looking record [5].
This suggests anything you do on the PC gets
recorded and sent to a server demonstrated by
the Trojan.
Trojan will send your charge card or keeping
cash information to people looking to either use
it or offer it.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer virus
PC virus is a malicious computer programming
that get stacked into a PC and once it sets up
itself, it can play out a few hurtful exercises to
the customer's machine [6].
Virus affects the boot area, email connections
and the executable codes and programs.
Document Page
Solutions
Installing anti-virus basics:
Therefore, make sure your anti-virus
program refreshes in an automated manner
in a specified time.
For the Trojan horse:
The best practice of controlling this Trojan
horse is by maintaining updates. The working
structures should be present in the recent
program refreshes.
Document Page
References[1] J. Siltaloppi, & M. Toivonen.” Integration of planning and
execution in service innovation”. The Service Industries
Journal, 35(4), 2015 pp.197-216.
[2] Kloth, A. K. Advanced Router Architectures. CRC Press, 2016.
[3] A. N Meyer, L. E. Barton, G. C. Murphy, T. Zimmermann, & T.
Fritz “The work life of developers: Activities, switches and perceived
productivity”. IEEE Transactions on Software Engineering, 43(12),
2017 pp.1178-1193.
[4] C. V. Sreevathsa, K. K Daina, K. L. Hemalatha, & K. Manjula.
“Increasing the performance of the firewall by providing customized
policies”. In Applied and Theoretical Computing and Communication
Technology (iCATccT), 2016 2nd International Conference, 2016 pp.
561-564. IEEE.
[5] M. Ludwig & D. Noah. The giant black book of computer viruses.
“American Eagle Books” 2017.
[6] D. Simberloff, C. Murcia, & J. Aronson. Novel ecosystems” are a
Trojan horse for conservation” ENSIA, 2015.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Thank you all
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]