answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What are some important considerations for data backups?

When you are trying to create a backup system you should consider the following:

  • What needs to be backed up
  • How often it needs to be backed up
  • How much space is necessary to back it up
  • Where the backup should be stored
  • How the backed up data should be encrypted and lastly;
  • Who should have access to the backup.

What is an illegal download?

Answer

An illegal download is a download that conflicts with the license. What I mean by this is if someone let's say makes a song and they make a license that states any sharing must be authorized by him or her. Then this means that anyone who shares it must ask the creator before they share the song and anyone who receives thesong can only view it. The problem is that people don't know if there is a license to obey. Sometimes people download songs from websites and then share them. Today record producers are suing many people for copyright enfringment. My golden rule is to never download songs or other media from websites. The problem is that there are so many websites and many of the media is malware infected. Even free popular media sharing programs like limewire are infected by malware.

Answer

an illegal download is where something such as a song is put on the internet without the composers consent. Then someone downloads the music and it is illegal.

What kind of backup site would have no or very limited equipment?

This would be one that is completely online. You would just need the computer or the server for it to work.

What is the role of computers in cybersecurity?

high security areas use a) fingerprint scanners

B)feet recognition systems

C) iris recognition systems

d)signature verification system

its one of these answers and im not understanding which

Reasons why information systems need to be replaced?

Some reasons why information systems might need to be replaced are:

  • Changes in the business environment in which the organization operates(for example a new computer enters the market
  • Technological Changes can lead to new production processes or use alternative materials in the manufacturing process
  • Downsizing from centralized decision making and information systems- to decentralized decision making and information systems to make the organization more responsive to customer needs
  • Re-engineering the organization's processes whereby an organization completely redesigns all its business processes to improve the performance of the business
  • Changes in activities of an organization or in the nature of the organization.
  • Maintaining a competitive advantage by Manufacturing a unique product line
  • Increasing productivity A move away from mass production to more quality based methods of production.

What encryption algorithm is fips 140-2 complaint?

Federal Information Processing Standards, generally set the standards for compliancy for cryptography modules . There are 4 security levels defined

Which is the single factor which can make oe break a security plan?

A single factor that can make or break a security plan are people.

How do you block traffic attempting to exit a LAN?

Generally traffic exiting a LAN is controlled at the router or firewall by setting rules in the configuration files for the router or firewall restricting what IP addresses traffic can be sent to, what devices outbound traffic can be sent from. You can also set rules controlling what outbound ports, protocols, and services will be blocked or allowed. Generally the best way to configure is "deny all and allow by exception" where all traffic is blocked by default and then rules are inserted to allow exceptions for specific traffic. You would also insert settings into the Access Control List.

Principle measures used to protect computer security?

The principle measures to be used to protect your computer security is not leaving your computer vunderable. Leaving it open for the world to see by not using anti-viruses programs or having a easy password to use.

How salami attack work?

Salami attack- This financial crime works by taking small amounts of money over an extended period. For the attacker to be successful, he must remove an amount so small that it will go unnoticed.

What is security of files?

Security normally refers to Confidentiality, Integrity and Availability.

Briefly, your files must be:

  • accessible: only to the persons and applications you authorize, and with the minimum privilege required (if a user has only the need to read a file, he/she MUST NOT have the right to modify or delete it);
  • modifiable: only by users or applications authorized to do so;
  • available: when the authorized users need to access them: a file is useless if it not available when you need it.

Additionally, there are a couple of additional related aspects that are:

  • authenticity: the files must be attributable without doubts to the creator;
  • non-repudiation: the creator of the file must not be able to disavow the files he/she has created.

What should you do if you have forgotten your password?

  • You click on the "forgot my password" section, fill it in and the new password will appear in your hotmail inbox.
  • You forgot to tell us what password. Is it windows password? If you forgot that,you can try some reset password tools, just like "Windows Password Recovery 6.0" I used last week.
  • If you have a password reset disk you can easily reset your lost password with it, Windows Password Breaker can help you create such a password reset bootable CD/DVD or USB flash drive. No need to reinstall your system.

How effective is a firewall?

A strong and upgraded firewall protection acts as a virtual barrier that defends external and internal damages from cyber attacks. Installing a powerful firewall protection on your system or network, provides you low-level protection against malware, identity theft or other cyber attacks along with the login and auditing procedures.

There are several forms of firewall, each having their own specific functions to perform. Broadly, firewalls are of two types- host-based and network based. A host-based firewall protection is installed on the user's computer or server to monitor the incoming and outgoing signals. On the other hand, a network-based firewall is installed over a network or cloud's infrastructure to control and protect the data being transmitted from one host to another on a network. A network-based firewall is also referred as a virtual firewall service.

How is computer information protected?

It heavily depends on software installed on them.

For example, computers with Windows installed aren't very secure, unless they have a firewall and antivirus installed.

Linux is secure, unless somebody configures it to not be secure.

BSD is security-oriented, so it's very secure.

As for hardware - not very much, since one can take out a hard disk and read it elsewhere, boot a LiveCD/DVD and crack local password, etc.

The security risks involved in allowing cookies to be stored on your computer?

Thankfully any sort of malicious cookie can and will be detected by your Antimalware or Antivirus software - it's generally one of the first areas that are checked! Cookies are just small bits of information used by websites to enhance your browsing experience and it is often considered a very small risk. It should also be noted that there are browser options to ensure that you don't receive tracking cookies if you are very privacy-focused.

How you can protect your computer from unauthorized access?

There are plenty of ways to prevent authorized access. Your first line of security is your computer password - this prevents physical intrusion at a basic level. Your second line of defense are the two brothers: Antivirus and Antimalware; often times AntiVirus programs are bundled with AntiMalware, ultimately that choice is up to you if you want to use a dedicated Antimalware program. These two programs defend and seek out intrusions via complex algorithms and comparing known attacks and symptoms by constantly monitoring your PC. While lots of AntiVirus programs offer a web-defense (defends you from shady websites) it's always good to consult your browsers' settings and enable any sort of Web Protection they offer; Chrome and Mozilla both maintain an initiative which collects user submitted info on reported websites and notifies you when you try to access one. These notifications may appear long before your AntiVirus picks them up.

If you wanted to take a step further in being actively protected, there are Keystroke Scrambler programs which scramble your keystrokes when typing - this prevents any program, such as a keylogger, from recording what you are actually typing. The scrambling software employs special algorithms which keystrokes appear normal for the user, but not for malicious software.

Lastly, the most important line of defense is common sense! Remember to remain aware of the dangers of clicking suspicious links, visiting websites you are unsure about, and downloading programs.

What is the difference between passive IDS and active IDS?

When you are using active scanning you have to send certain signal through network. This kind of attack the easiest to find, but the fastest to get information about a remote computer.

When you are using passive scanning, you are collecting information which are going through network without sending any request to a remote computer. This sort of attack really hard to find, but it's possible using special kinds of network packets. It requires more time then for the active mode.

Does firewall block viruses?

Firewall don't stop viruses it just keep ypu computer safe...

I mean when you run program, firewall will ask you if you let this program to run or not...

When virus try to run program secretly when you will not notice the program, but firewalll will tell you that some kind of program is runned, so you may block it and that will stp the virus.

only the antivirus software on stops the viruses.

How the use of computer networks can improve communication for the individual?

My caterpillar kidnapped the man who had murdered Mr. Carrot who (believe it or not) was going to be the caterpillars tea so the caterpillar cried so much that his tears drowned the monkey so the gorilla squashed the caterpillar.

P.S. I'm flying evil rainbow firebreathing pineapples

What are disadvantages of using a star topology?

If the server dies, the computers get unseen for each other. It isn't a good idea in every situation to leave the whole network to only 1 computer, because if it ets an error, your network is dead.

Hacking is it a crime?

That depends on what you hacked and what way you hacked it. Did you know it's actually illegal to add/remove a user account on a computer that's not yours, if you on a limited account. In a court of law, this is considered hacking.

In Ireland there was a case a while back in which a person ended up in court for the above reason being tried as a computer hacker.

Yet about 3 months later somebody happened to stumble upon a flaw in a prominent politicions website, he published his findings, got caught, and was told "he was nothing more than a router with too much time on his hands who got lucky" and this particular man had studied IT in one of the best colleges in the country.

How do you protect against a power surge?

The easiest way is to use an UPS. It's a device that provides voltage during a limited period of time. If you are more than a real company their are other solutions like a generated but keep in mind that this cost you a lot of $.

In a multiprogramming and time-sharing environment several users share the system simultaneously This situation can result in various security problems?

Two possible security problems could be: copying another user's data; using system resources (CPU, memory, disk space) without proper accounting.

How does data encryption help keep data secure?

When data is stored or sent, it can be sent as it is, when over a network this would be packets.

But when data is encrypted, its simply like saying, if i sent you an email that says

Hi, How are you

H = 103343

i = 408300

, = 985742

The numbers are sent not the letters so the computer on the other end, Decrypts this data for your display.

How many people hack?

Well, Many people consider hackers to be crazy people who really try and spend all their time "hacking" people, but really hacking isn't as easy as many people think it is, this question is hard to answer but it would actually be a lot less than many would think.