Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Bibliofind
Q1: Firewalls can be defined as a security system which is used to control access in a company
protected area within corporate network. “Firewall normally protects computer networks from
PressPass). It examines traffics which are routed between two networks in order to see if it can
meet certain criteria and if these criteria are met then it is fixed between the networks. Firewalls
filter both incoming and outgoing traffic. According to Stephen and Michael (2009) firewalls can
be implemented both in software and hardware. The common types of firewalls include packet
filter, application gateway, circuit- level and Proxy server. The firewall is placed between the
In choosing the firewall to use, there are important issues Bibliofind needed to consider and they
include:-Application protection, stealth mode, inbound and outbound filter. Outbound and
inbound filters information when they passes through the system, only important information
will be allowed to pass while discarding the rest based on the rules which have been created by
the Bibliofind Company. This is the primary function of the firewalls. Bibliofind ought to have
paid attention to this kind of information in order to protect their server from intruders.Bibliofind
should use Stealth mode because it is one of the vital elements or rules to be considered while
installing its firewalls as it helps not to block but to make your computer appear as if it does not
exist. Due to this, intruders and hackers will be made to think that you are not connected or you
are offline.
Sebastian Rodriguez 16-0929
Use of Intrusion detection is also one of the best ways Bibliofind ought to have
used since hackers usually use very many ways to penetrate the security system. Scan for
intrusion detection is important and it would have helped Bibliofind to notify the presence of
such intruders and Biblofind could have been safe from these hackers.
Q3: Personal information can be defined as; or to include individual name, personal, social status
and any other information which might be of any security concern. When this bill was passed in
state of California, many people supported it while others decline to support it. The arguments
against this bill is that it might make consumers to believe that data breach could lead to stealing
of identity and this could lead in the increase of the cost of running the business without
any business (Kathryn 2002) argued that it could not fit and the time for presenting the argument
in court could be wasting the precious time. Besides, the law itself also lacks the vital
information like time of the breach or the kind of information that might have been breached.
The law also can be argued in support of it that it will be an eye opener to the consumer;
the consumers will understand well the essence of security for private information and also to
protect themselves from the identity theft, it could also dispel the uncertainty around security
breach and a good step taken in solving one having his or her information breached. The law
could make modest and helpful steps in current security breach notification and help in reducing
Regarding the enacting of this law, (Stephen et al.) argued that if this law is not brought
to force, security breaches will go on until that point business society will find the investment
needed to implement the security system in the company being more than the cost of investment.
It is good that this law comes at the right time to help solving this problem. It is high time both
the government and private investors shift cost benefit analysis to upgrade better security system.
Good care and standard must be maintained to govern the implementation of this law and the