Tumgik
Text
__digital empowerment__
Q1 a)                          THREE SECURITY TOOLS
1.FIREWALL
The most important security tools. 
Its job is to prevent unauthorized access to or from a private network.
All messages are entering or leaving the intranet pass through the firewall. The firewall examines each message and blocks those messages that do not meet security check.
The Firewall is very useful, but it has limitations also. 
A skilled hacker knew how to create data and programs that are believing like trusted firewalls.it means they can pass through without any problem
2. Antivirus Software
Antivirus software is a program which is designed to prevent, detect, and remove viruses and other malware attacks on the individual computer, networks, and IT systems.
 Tt also protects our computers and networks from the variety of threats and viruses such as Trojan horses, worms, browser hijackers, spyware,ransomware.
 Most antivirus program comes with an auto-update feature and enabling the system to check for new viruses and threats regularly.
 3. Data Encryption
Data encryption is very important when you have top secret files that you don’t want to be read even if they are stolen
Encrypted communication protocols provide a solution to this lack of privacy.
The encrypted web access provided for customer security is used by attackers because it is difficult to monitor. 
 Q1 b)     DIFFERENCE  B/W  PRIVACY AND SECURITY
PRIVACY
Privacy defines the ability to secure personally identifiable data.
Privacy can't be adept without security.
Privacy defines protecting sensitive information associated to individuals and organizations.
Privacy programs  concentrate on protection personal information just like passwords, log-in  credentials, etc.
SECURITY
Security define  protecting against unauthorized access.
Security can be  adept without privacy.
Security supports  protection for some types of data and information such as the ones that are  saved electronically.
The security  programs defines the set of regulations and protocols to secure each confidential  information.
2 notes · View notes