answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is the role of data manager in dbms?

DBMS stands for DataBase Management System. So it's role is basically to manage the database. More specifically this software controls the storage, organization, retrieval, integrity and security of the data in the database.

What is KOV-26 Talon?

The KOV-26 Talon is Type-1 encryptor manufactured and sold by L-3 Communications. It is a PCMCIA card that encrypts traffic sent through it (an in-line Network Encryptor). It is primarily intended for use with mobile computers such as laptops, although it can be used with desktop computers as well. Is is sold with adapters that allow it to connect to Ethernet, WiFi (802.11 b/g), dial-up modem (V.90), and serial (RS-232). It is capable of using a variety of key management protocols.

It can be used to encrypt communications up to and including TS/SCI. As such, it is a COMSEC Controlled Cryptographic Item (CCI) releasable to CCEB Nations and NATO - U.S., U.K., Canada, Australia, and New Zealand.

Why does this message always appear after being away for a few minutes this computer is in use and has been locked?

Modern operating systems can have their interface "locked" so that the user logged in will not have their files looked at while they are away. This is enabled by default on most new operating systems as a security feature, but can be disabled by checking the screen saver or power saver options. You may turn this feature off if you would like, but it's generally considered a good idea to keep it on, as a matter of security.

Merit and limitation of password guessing?

Password guessing is usually more of an art or a brute force method of cracking a password. As such it doesn't require much sophistication - anyone can guess at passwords - but it is extremely limited and unlikely to correctly guess passwords created with proper complexity.

What is the sanitation process recommended by the DoD 5220.22-M standard?

5220.22-M does not specify a standard, only that media that stored security-clearance required files must be sanitized. The Defense Security Service defines the Clearing and Sanitization Matrix, which actually specifies what actions must be taken for various types of media.

When in sleep mode can your security access the computer to run sweeps etc?

When a computer is in Sleep mode, the programs are ready to run again but do not actually run. Therefore scans cannot be done in Sleep mode with conventional Antivirus software.

What kind of password is easy to remember but hard to guess?

A well chosen pass phrase can be used to generate an easy to remember password. The password can be generated by taking just the first letters of each word in the pass phrase and adding characters and numbers (or substituting them - like 4 or @ in place of A and 1 or ! in place of L etc). The resulting password will be fairly easy to remember or recreate but tough to guess.

What is computer hazard?

kau na lang ang sumagot....di ko kasi alam ehhh...

How can I stay safe when using ICT at home?

you can choose an security program to protect your computer from potential viruses and other threats from malicious software in real time, also your important or private data can be protected. i just use the program "avast! Internet Security ", which is powerful, and i can surf the Internet freely and don't worry about all the time, you can have a try. Good Luck!

If you can't find one, plz visit the following site:

http://www.globalshareware.com/Internet/Online-Privacy/avast-5-Internet-Security.html

How can you stay safe when using ICT at home?

you can choose an security program to protect your computer from potential viruses and other threats from malicious software in real time, also your important or private data can be protected. i just use the program "avast! Internet Security ", which is powerful, and i can surf the Internet freely and don't worry about all the time.

Why does joining your City network give up a lot of privacy?

Typically City networks are not locked down as completely as say a corporate network. They do not protect information on who is connecting to the network - thus less privacy. Their records are more open to the public than a corporate network. You need a subpoena to get the records from a private company. A city can give their records more or less to anyone they want.

What is an example of an weak password?

can you give me one example of a weak possword

How many numbers is in a security code?

brobably 4 or 5 numbers mainly they input their dob it means six numbers.

What is the purpose of the Microsoft baseline security analyzer?

The Microsoft Baseline Security Analyzer is a program that attempts to assess some aspects of the security of an individual computer. It does this by checking two things: whether security updates released by Microsoft have been applied, and whether certain less-secure security settings are present. The security settings are assessed from a fixed list of registry and program checks.

Why is password length important?

As the length of the password increases, the amount of time it takes to find it through brute force increases exponentially.

What are three actions you should take if you are victimized by online fraud?

There are many steps one might take, but I will go over just a few.

1) Cancel any credit card used in the fraud at once, contact the provider and let them know you suspect fraud and they can lock the card, provide a knew one and track any attempts to use the stolen information. Credit card companies are exceedingly good at this.

2) Change any/all passwords at once. You should be doing this regularly anyway, I recommend a three month rotation but you could probably be safe just switching them once in a while or more often for the truly paranoid.

3) If you suspect identity theft, contact the three main credit tracking agencies (Equifax, Experian and TransUnion) and report identity fraud and have them lock your credit report down. This will prevent you from opening any new credit but it will also prevent the thieves from doing so as well.

Those are a good start. There is a wealth of info out there, keep looking.

What type of security was dominant in the early years of computing?

During these early years, information security was a straightforward process composed predominantly of physical security and simple document clasification schemes.

What is cleartext?

A term used to describe any data that is not encrypted. For example, telnet transfers network data as cleartext data, meaning if the network was being sniffed, a username and password could easily be obtained. Users concerned about their security should never store or transfer their data as clear text. This text you're reading is considered cleartext.

What is cleartext in Linux?

A term used to describe any data that is not encrypted.

What is use of cybersitter?

a cibersitter is bad its kind of like a cookie its not very bad but you should get rid of it.

Is beatrice okay to use for your password?

"beatrice" would probably be a lousy and easily cracked password. It is too short, and since it is a reasonably common name, it would probably be contained in any decent dictionary used for a dictionary attack.