BLOGGER TEMPLATES AND Tagged Layouts »

Linggo, Agosto 21, 2011

BURNI'N.....!!!!HOT!!!.....FIREWALL

Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routersthat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.


HISTORY:
The term firewall originally referred to a wall intended to confine a fire or potential fire within a building; cf. firewall (construction). Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.
Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s:
  • Clifford Stoll's discovery of German spies tampering with his system
  • Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic to observe an attacker
  • In 1988, an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues  that read, "We are currently under attack from an Internet VIRUS! It has hit BerkeleyUC San DiegoLawrence LivermoreStanford, and NASA Ames."
  • The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one.

WATIS!!!!!!!!!BIOMETRICS????

Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns.
verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience.

Biometric devices, such as fingerscanners, consist of:

A reader or scanning device
Software that converts the scanned information into digital form and compares match points
A database that stores the biometric data for comparison
To prevent identity theft, biometric data is usually encrypted when it's gathered. Here's how biometric verification works on the back end: To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.
LEARN MORE:
http://biometrics.cse.msu.edu/info.html
http://www.biometrics.gov/