According to the network system security, please explain:
1- What is canary and how it does work in network system security?
2- What is Malware and how it does work in network system security?
Answer:
1)
Canary is an intelligent, connected, home security camera that's sensible and subtle enough not to look like you've got you and your guests under the beady eye of CCTV 24/7. Silent and cylindrical, it looks more like a Bluetooth speaker than anything else as it sits on the side, on top of your telly, on a shelf or whichever part of the house suits you best.You can connect up to four of them to the Canary platform, which you can access on your iOS or Android device, to give you all the information you'll need on the comings and goings inside your property. It gives you peace of mind when you're out at work or away on holiday and it's been catching crooks and the clips of the lighter side of life too, in both Europe and North America, since launch in 2014.
Motion detection is the key for Canary. When it senses something moving, it starts recording that video stream and, whether day or night, the clips are crystal clear thanks to infrared LED technology and a solid camera array. Canary sometimes captures false positives but, if you start to tag these events, then your Canary begins to learn what it needs to ignore. What's more, a recent update means that you can dial up or down its sensitivity to help calibrate it even further.
The other time that it needs to ignore movement is, of course, when you and your housemates are home. Fortunately, there's no need to manually arm and disarm Canary each time you come and go. Instead, you download the Canary app to your mobile and it will detect whether that phone is home or not through GPS, cellular data and Wi-Fi, and, yes, you can have more than one phone connected to a single Canary. Of course, if you wish to arm the device when you go up to bed at night, then that's perfectly possible too.
2)
Malware, or malicious software, is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission. There are different types of malware that contain unique traits and characteristics. A virus is the most common type of malware, and it's defined as a malicious program that can execute itself and spreads by infecting other programs or files. A worm is a type of malware that can self-replicate without a host program; worms typically spread without any human interaction or directives from the malware authors. A Trojan horse is a malicious program that is designed to appear as a legitimate program; once activated following installation, Trojans can execute their malicious functions. Spyware is a kind of malware that is designed to collect information and data on users and observe their activity without users' knowledge.
Other types of malware include functions or features designed for a specific purpose. Ransomware
According to the network system security, please explain: 1- What is canary and how it does...
Explain the purpose behind DNSSEC. How does it use cryptography to secure network traffic? How is it used by organizations to ensure network security?
Explain some paragraph important points about computer and network system security?
A network diagram for a fictitious company is provided. Explain how you would improve the security of this corporate network. Take care to explain the technologies that you have chosen, their role in securing the network, and provide a diagram of the improved corporate network. Unit: Enterprise Network Security
Flowchart or diagram explain how network security will help designing an automation big data. And/ or how the network security tools or devices help the digital forensic investigator collect and analysis Big Data?
Network security 1. explain succinctly how a Denial of Service attack may occur on an implementation of the TCP protocol's 3 way handshake? 2. Suggest solutions on your own on how such a Denial of Service attack on TCP 3-way handshake can potentially be prevented or mitigated? Note that you are being asked to think through this answer on your own. You are however allowed to research on the Internet for potential solutions. Please make sure you understand the solution...
10. What does " break the buck" have to do with the canary in the coal mine? (early warning) 11. Who is Elizabeth Warren and how does she feel about big banks? 25. Describe the difference between default risk and risk of loss. Which seems more important?
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrator, however, does not see any suspicious processes running. A prior technician's note indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently. Which of the following is the most likely cause of this behavior? A. Crypto-malware B. Rootbit C. Logic bomb D. Session hijacking
After a security review, it is recommended that your organization install a network intrusion prevention stem (NIPS). Based on the current budget, your manager recommends that you install a less-costly network detection system (NIDS). What is the primary security difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS) that you can use to justify the additional costs? Explain how the difference is a positive or a negative in terms of security.
please explain in details. thanks
1. What is a defibrillator? And how does it work? Explain in detail. ( explain it in a minimum of 3 to 4 paragraphs in details) 2. What is the Resistors for human skin? Explain in details 3. How long can you apply Electric currents to the human body? Explain in details 4. Why can we only apply electric currents for a short time in the human body? Explain