This software is designed to find viruses and other harmful malware, including ransomware, worms, spyware, adware, and Trojans. Examples of tools include Norton 360, Bitdefender Antivirus, Norton AntiVirus, Kapersky Anti-Virus, and McAfee Total Protection.
Antivirus software
________ is a security protocol that is used for the purpose of encryption. It ensures privacy, data integrity, and authentication in the network like online transactions.
SSL encryption?
Ports 20 and 21
File Transfer Protocol (FTP)
This layer allows the transmission of raw data bits over a physical medium.
Physical layer
(formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing.
Kali Linux
Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft. They can be motivated by greed, a political agenda, or simply boredom.
Hacker, Black Hat
Port 22
Secure Shell (SSH)
This layer determines the format of the data in the network.
Datalink layer
A network infrastructure to prevent intrusions by hackers
Denies the malicious traffic
Does not deliver malicious packets if the traffic is from known threats in databases
IPS
The acronym stands for Distributed Denial of Service and is a favorite Black Hat tool. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to temporarily shut down.
DDoS
Port 443
HTTP Secure (HTTPS)
It tells which path the data will take.
A network infrastructure to detect intrusion by hackers
Flags invasions
Detects port scanners, malware, and other violations
IDS
CIA Triad
Port 80
Hypertext Transfer Protocol (HTTP)
Data encryptions happen in this layer, and it ensures that the data is in a usable/presentable format.
Presentation layer
It is a fantastic network scanning tool that can give you detailed information about a target. This includes open ports, services, and the operating system running on the victim’s computer.
NMAP
What encryption type is only one key to encrypt and decrypt a message
Algorithms: RC4, AES, DES, and 3DES
Usage For the transmission of large chunks of data
Symmetric Encryption
Port 53
Domain Name System (DNS)
This layer allows the transmission of data using TCP/UDP protocols.