Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 11SI
Explanation of Solution
Security of PC connected to the internet:
“Yes”, the owner must install a proper firewall to prevent the PC connected to the Internet from a denial of service attack implemented by another party.
Reason:
The PC owner is liable to the extent if the PC contains firewall installed in it or not and the level of protection from the firewall.
The PC owner can protect his personal computer connected to the internet from the denial of service attack if he installs a firewall in the PC.
The denial service attack is a type of attack by the hackers which prevents the authentic user to access the service...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Let's pretend you're employed by a company that uses a firewall to keep its internal network safe from the wider Internet. Is it advisable to set up individual firewalls on all office computers? If so, why do you suppose that is?
Is there a typical link between a network that cannot be trusted, a firewall, and a network that can be trusted, and how does this connection function?
Consider a case where some servers require more contact with the outside internet than most systems belonging to a company. How can a company use firewalls to provide appropriate levels of protection to all their computers (drawing a diagram may help, but is not required)?
Chapter 4 Solutions
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Ch. 4.1 - What is an open network?Ch. 4.1 - Prob. 2QECh. 4.1 - What is a router?Ch. 4.1 - Prob. 4QECh. 4.1 - Prob. 5QECh. 4.1 - Prob. 6QECh. 4.2 - Prob. 1QECh. 4.2 - Prob. 2QECh. 4.2 - Prob. 3QECh. 4.2 - Prob. 4QE
Ch. 4.2 - Prob. 5QECh. 4.2 - Prob. 6QECh. 4.2 - Prob. 7QECh. 4.2 - Prob. 8QECh. 4.3 - Prob. 1QECh. 4.3 - Prob. 2QECh. 4.3 - Prob. 3QECh. 4.3 - Prob. 4QECh. 4.3 - Prob. 5QECh. 4.4 - Prob. 1QECh. 4.4 - Prob. 2QECh. 4.4 - Prob. 3QECh. 4.4 - What keeps a computer on the Internet from...Ch. 4.5 - Prob. 1QECh. 4.5 - Prob. 2QECh. 4.5 - Prob. 3QECh. 4.5 - Prob. 4QECh. 4.6 - Prob. 1QECh. 4.6 - Prob. 2QECh. 4.6 - Prob. 3QECh. 4.6 - Prob. 4QECh. 4.6 - Prob. 5QECh. 4 - Prob. 1CRPCh. 4 - Prob. 2CRPCh. 4 - Prob. 3CRPCh. 4 - Prob. 4CRPCh. 4 - Prob. 5CRPCh. 4 - Prob. 6CRPCh. 4 - Prob. 7CRPCh. 4 - Prob. 8CRPCh. 4 - Prob. 9CRPCh. 4 - Prob. 10CRPCh. 4 - Prob. 11CRPCh. 4 - Prob. 12CRPCh. 4 - Prob. 13CRPCh. 4 - Prob. 14CRPCh. 4 - Prob. 15CRPCh. 4 - Prob. 16CRPCh. 4 - Prob. 17CRPCh. 4 - Prob. 18CRPCh. 4 - Prob. 19CRPCh. 4 - Prob. 20CRPCh. 4 - Prob. 21CRPCh. 4 - Prob. 22CRPCh. 4 - Prob. 23CRPCh. 4 - Prob. 24CRPCh. 4 - Prob. 25CRPCh. 4 - Prob. 26CRPCh. 4 - Prob. 27CRPCh. 4 - Prob. 28CRPCh. 4 - Prob. 29CRPCh. 4 - Prob. 30CRPCh. 4 - Prob. 31CRPCh. 4 - Prob. 32CRPCh. 4 - Prob. 33CRPCh. 4 - Prob. 34CRPCh. 4 - Prob. 35CRPCh. 4 - Prob. 36CRPCh. 4 - Prob. 37CRPCh. 4 - Prob. 38CRPCh. 4 - Prob. 39CRPCh. 4 - Prob. 40CRPCh. 4 - Prob. 41CRPCh. 4 - Prob. 42CRPCh. 4 - Prob. 43CRPCh. 4 - Prob. 44CRPCh. 4 - Prob. 45CRPCh. 4 - Prob. 46CRPCh. 4 - Prob. 47CRPCh. 4 - Prob. 48CRPCh. 4 - Prob. 49CRPCh. 4 - Prob. 50CRPCh. 4 - Prob. 1SICh. 4 - Prob. 2SICh. 4 - Prob. 3SICh. 4 - Prob. 4SICh. 4 - Prob. 5SICh. 4 - Prob. 6SICh. 4 - Prob. 7SICh. 4 - Prob. 8SICh. 4 - Prob. 9SICh. 4 - Prob. 10SICh. 4 - Prob. 11SICh. 4 - Prob. 12SI
Knowledge Booster
Similar questions
- Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if either the AS (authentication server) or TGS (ticket granting server) goes down?arrow_forwardDescribe the steps that one person would need to do in order to pull off a distributed denial of service attack all by themselves.arrow_forwardGiven have a firewall between the Internet (represented by a cloud) and your network router. And some active attacks are added from the list of active attacks; os exploits, viruses, trojans, etc. Please refer to the diagram attached. Are these attacks able to get to your network? Do you feel your system is secure? What’s wrong with this scenario? please don't copy the solution on Bartleby. it does not answer the questionarrow_forward
- Consider the following scenario: The mail server at your employer sends you an email alerting you that your password has been changed and that you must confirm it. But you haven't updated your password, have you? So what? What may have prompted the password change? How did an attacker obtain the information required to change the password? What systems were infected by a virus?arrow_forwardIs it true that a distributed denial of service attack, often known as a DDoS attack, can only be carried out by one person?arrow_forwardFor instance, to be accepted into ABC Corporation's network, a device must include operating system X with the latest available patches, up-to-date antivirus software, and a firewall. Are noncompliance devices required to follow remediation? If so, who is responsible for the remediation?arrow_forward
- Suppose you receive a letter, which appears to come from your company’s mail server stating that the password for your account has been changed, and that an action is required to confirm this. However, as far as you know, you have not changed the password! What may have occurred that led to the password being changed? What type of malware, and on which computer systems, might have provided the necessary information to an attacker that enabled them to successfully change the password?arrow_forwardIs it true that nobody has ever been able to mount a successful distributed denial of service attack?arrow_forwardWhat is a Denial of Service (DoS) attack, and how does it work in the context of network security?arrow_forward
- Try to find a distributed denial of service (DDoS) attack that occurred during the last three years. It is now time to examine the attack's timeframe and methods. Explain!arrow_forwardConsider the following scenario: you receive an email from your company's mail server alerting you that your password has been changed and that you must take action to confirm this. However, as far as you are aware, you have not changed the password. What gives? Why was the password changed, and what could have caused it to be changed? How did an attacker obtain the information they required to successfully reset the password? Was it a virus, and on what systems did it infect?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,