Ch.9.4 Helpdesk: Understanding Firewalls

¡Supera tus tareas y exámenes ahora con Quizwiz!

What else can hackers do?

Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer.

Besides committing identity theft, what else can hackers do?

Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge.

Once I download or buy the firewall software, how do I get it installed and tested?

Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe.

Is it important to have a firewall on a home network?

To be safe, you should always have a firewall if you plan to connect to the Internet.

Are there different kinds of firewalls?

You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

But how will a firewall help if I'm not exchanging any valuable information over the Internet and don't have any important files on my computer?

A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft

What are logical ports?

A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers.


Conjuntos de estudio relacionados

DSM-5 Neurodevelopmental Disorders

View Set

Growth and Development of Newborns and Infants

View Set

HESI case study: Healthy Newborn Stacy Myers

View Set

CompTIA A+ Chapter 22, Wireless Networking

View Set

Chapter 16 Book 2: Scientific Revolution and Enlightenment (1540-1789)

View Set