List three types of firewalls
Packet-filtering firewalls
proxy firewalls
stateful inspection firewalls
What name is given to the encrypted text?
Cipher text
Define what biometrics is in information security mechanism
Biometrics refers to the measurement and statistical analysis of people's unique physical and behavioral characteristics. Examples include fingerprint recognition and facial recognition.
How do firewalls differ from antivirus software?
Firewalls monitor and control network traffic to prevent external threats, while antivirus software scans for and removes malware from individual devices.
We use the sender's public key to encrypt text in asymmetric encryption. True or False
False. We use receivers public key to encrypt text
Define the term physical security to information system
Physical security in the context of information systems refers to the protection of hardware, software, data, personnel, and network infrastructure from physical threats that could lead to unauthorized access, damage, theft, or destruction.
Explain how a firewall works to protect a network
A firewall monitors and controls incoming and outgoing network traffic based on security rules. It acts as a barrier between a trusted network and untrusted networks (like the internet), blocking potentially malicious traffic.
Compare symmetric and asymmetric encryption, including the advantages and disadvantages of each.
Symmetric encryption uses one key for both encryption and decryption, making it faster but less secure if the key is compromised. Asymmetric encryption uses two keys (public and private), enhancing security but is slower due to its complex algorithms.
Give two examples of biometrics
fingerprint scanner
face recognition software
retina scanner
voice recognition software