Hi Tyrone could you teach me a little something about Threat prevention Methods, I'm really struggling here.
Sure thing Bob
There are a number of defensive strategies and tools that have been developed to assist in preventing threats. These include encryption, firewalls, anti-virus software, biometric security, user identification and passwords, security monitors, and disaster recovery.
Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. In its encrypted, unreadable form it is referred to as ciphertext.
Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
Asymmetric encryption takes relatively more time than the symmetric encryption.
Firewall and MAC filtering are two types of cyber threat protection techniques. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.
MAC Filtering refers to a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.