TLE2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CISCO PIX Firewall

URL: https://www.cisco.com/
Hardware features
 Cisco Defense Orchestrator. Manage security policies simply and consistently from the
cloud.
 Firepower Management Centre. Gain unified management over firewalls, application
control, intrusion prevention, URL filtering, and advanced malware protection.
 Firepower Device Manager. ...
 Cisco SecureX.
COST
$595.00 UP TO A HUNDRED DOLLARS more depending on its features
Subscription length: Lifetime

SonicWall
URL: https://www.sonicguard.com/PRO1260.asp
HARDWARE FEATURES
 Unique PortShield Architecture provides the flexibility to configure all 24 LAN switch ports into
separate security zones
 Integrated gateway anti-virus, anti-spyware and intrusion prevention support
 Built-in 24-port auto-MDIX Layer 2
 Easy-to-use wizards
 Advanced security and networking features SUCH AS S Enhanced include WAN/WAN failover,
distributed wireless, zone and object-based management, policy-based routing and NAT, anti-
spam and more
 The optional port can be configured as a demilitarized zone (DMZ) for public facing servers or
Internet resources
COST
1100-$3,000 depending on features
Subscription length: Lifetime

I would choose SonicWall Pro1260 because provides a DMZ where I can place my web
server to prevent Internet users from accessing my internal network. Also, the hardware
is very expandable, so when I plan to start a business in the near future, this hardware
will be able to support it.
SOFTWARE
Checkpoint/ZoneAlarm Pro

Website URL: http://www.zonealarm.com

Cost: $39.95
Subscription length: 1 year
FEATURES

Anti-Phishing
Protects you against Phishing attacks.

Advanced Firewall
Monitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional
anti-virus protection.

Two-way Firewall
Makes your PC invisible to hackers and stops spyware from sending your data out to the Internet.

Identity Protection

Helps to prevent identity theft by guarding your personal data.

COMOBODO
URL: https://personalfirewall.comodo.com
Cost: 29.99
Subscription length: 1 year
Features
Easy-to-use setup and configuration
Quick user behaviour analysis allows personalized protection
Visually impressive, user-friendly graphical interface
Open configuration options allow pro users to tweak settings
DDP-based security for maximum protection and updated alerts
I would pick ZoneAlarm Pro because The software is not that inexpensive compared to the other,
offers a lot of features. My family also uses my computer for online gaming, paying bills, and e-
mail so I think This software will be able to give more protection for all of these activities.

LESSON 2
Uses of file and printer sharing

 It allows easy access and share files and folders on computers that belong to the same
Workgroup
 helps large groups such as   businesses save time and money because There is no need to buy
storage devices when devices are connected to each other in a network.
 Allows computers that are part of the main network and same Workgroup to send print jobs to a
printer connected wired or wirelessly to your computer
 fiile sharing can prevent data loss, It can be used to secure data during transfer in a network.
 File sharing helps monitor and limit file access to increase security

Printer share out on Windows XP (Host) - Simple Sharing (without password)

 Click Start -> Settings -> Printers and Faxes


 Then right click the printer icon that you want to share out and choose Sharing...

Choose the option Share this printer and type in the Share Name in the text box.

Then there will be a hand appear under the printer icon  .Connect from Windows XP
(Client side)

 Click Start -> Settings -> Printers and Faxes


 Double click Add Printer
 Select A network printer, or a printer attached to another computer when prompt

Then input the path for the shared printer like \\computer_name\printer or using the browse function
to locate the share printer.

 Follow the instructions to complete the setup.

 The ability to share files, collaborate, and communicate smoothly is crucial for all the processes
in a workplace. In the past, sharing files was often time-consuming and costly. However, with
advancements in modern technology, it has never been easier to share files and collaborate.
Today, all you need is a few clicks to get things done. No need to waste paper printing out files
or wait for several hours or even days for the courier to deliver documents. 
One of the main advantages file sharing is that it makes works and projects easier. You can
share files instantly, access information quickly, and avoid any unnecessary delays. file sharing
makes it easier than ever to manage projects. Since all your files are stored in one place, you
can check on the progress of your team, group or co-workers and help them along. Also, you
can instantly communicate with members of the team. All this means that you can consistently
meet deadlines – even if you are working remotely.

Sharing files is a necessary part of any projects especially when it comes to businesses. The
right file sharing tool can be useful because it can us save time and money, prevent data loss,
monitor and limit file access to increase security, and make file organization easy. These
benefits impact day-to-day and long-term operations.

PERSONAL SAFETY WHILE WORKING WITH PC’s

 Remove your watch and jewelry and secure loose clothing.


 Turn off the power and unplug equipment before performing service.
 Cover sharp edges inside the computer case with tape.
 Never open a power supply or a CRT monitor.
 Do not touch areas in printers that are hot or that use high voltage.

Risk Assessment

The following are the two main things in which a person in charge or responsible for safety should
consider whenever the risk is being assessed:

1. Likelihood of the risk harming you or someone - you should evaluate the risk to better understand the
situation. If there's a high likelihood of you or someone else being harmed, it is better to ask help from
specialists or emergency teams  
2. Intensity of the risk that you or someone might be harmed - if upon evaluation, the risk couldn't be
prevented, evaluate the intensity of the harm that you or someone might experience. If it's life threatening,
again, it is better to seek help from specialists
Vacuumed the vents with a handheld vac or dusting attachment on a household vacuum
cleaner.then Blew the dust out of the vents using compressed air while Being careful to
angle the air flow away from the computer to ensure that the dust wouldn’t be blown further into
the computer case.

REMARKS:

Computer overheating is usually caused by multiple factors. Dust, if left to build up over time,
can block the fans and cause the CPU or GPU to overheat. Remember to clean your PC
regularly for Removing dust, dirt, and other particles that get into a PC can improve speed,
performance, and air flow all at once.

STEPS IN CONFIGURING SYSTEM AND NETWORKS


Create cross-over and straight-through cables;

• Assign IP address to clients and servers;

• Configure the assigned IP address to clients and servers;

• Enable network security to the computer systems;

• Configure file and printer sharing.

You might also like