answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is a local database?

A local database is a database that is stored and managed on a local device, such as a personal computer or a server, rather than being hosted on a remote server or in the cloud. It allows for quick access and manipulation of data without relying on internet connectivity. Local databases are often used in applications where data needs to be processed quickly and where security or privacy is a concern. Examples include SQLite for mobile applications and Microsoft Access for small-scale projects.

Why do cryptologists recommend changing the encryption key from time to time?

to re-protect our data and to save from key tampering (man in middle attack)

Examples of public key cryptography?

Public Key Cryptography is a method of secure communication. It involves the creation of both a public and a private key. When sending a message, the sender encrypts the message with the recipients public key. After receiving the message, the recipient may then decode the message with his/her associated private key.

One area that public key cryptography is used in is SSL / TLS (Secure Socket Layer). An example of an SSL library is the CyaSSL Embedded SSL Library. CyaSSL provides several public key cryptography options, including RSA, DSS, DH, and NTRU.

In addition to SSL, Public Key Cryptography is used in a large variety of techniques, algorithms, and protocols including:

Diffie-Hellman key exchange protocol

RSA Encryption Algorithm

Cramer-Shoup cryptosystem

NTRUEncrypt cryptosystem

GPG, OpenPGP

Internet Key Exchange

PGP

What is the public key concerning your cac?

The public key concerning the CAC refers to the authorized key that is open to all the concerned people. The encryption procedure ranges according to the key.

How many keys are required for two people to communication via a cipher?

That depends on whether you use a symmetric (shared key) or asymmetric (public/private key pair) algorithm.

If you use a symmetric key, it means both people have the same key which has been pre-shared via some secure means. In that case, only one key is required; both parties in the communication use the same key to encrypt and decrypt all messages.

If you use an asymmetric key algorithm, it takes at least 4 keys total: when sending a message each user will encrypt their message with the public key of the recipient (that accounts for two of the keys). Each recipient must then use their private key to decrypt the messages they receive (which accounts for the other two required keys).

What do securities brokers do in addition to buying and selling securities?

In addition to buying and selling securities, brokers can advise and educate their clients on investments, saving for retirement, and tolerance for risk. Overall, brokers spend a great deal of time marketing their services and products

What is number 1 password be security?

If you want the most often used passwords, it looks like 123456 and password are the top two on the list, that I found.

What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.

How do you launch a coordinated DDos attack?

Using software such as LOIC (Low Orbit Ion Cannon), many people can launch an attack against a website, server or router at the same time. This is a coordinated DDoS attack.

DoS and DDoS attacks are illegal under the law.

Which can be used to launch a coordinated DDoS attack?

HOIC (High Orbital Ion Cannon) can be used to launch both DoS and DDoS attacks. DoS and DDoS attacks are against the law, so I advise you that if you don't want to get arrested, you shouldn't execute one. Obviously you will be caught in the act if you do because you are a n00b.

What does it mean when it says 7 characters long and contain at least 1 number?

Characters are letters, numbers or symbols, not including spaces.

You are being asked to create a password that is made up of 7 letters, numbers or symbols that has at least one number in it.

Examples:

  • greyparrot3
  • mous3_and_chee$e
  • 6GummyBears
  • Seven_7

What can be used to launch a coordinated DDoS attack?

Basically, you just need a lot of computers. Not four of five, but more like a server farm. You will also need a program to drive each computer, telling it to download over and over.

--Please don't try it.

What is the correct definition of Differential backup?

A differential backup backs up all changes since the last full backup. To restore everything only the last full backup and the last differential backup are needed.

What are the two names of the most popular hashing algorithms?

Both SHA-1 and MD5 are good hashing algorithms. The primary difference

between the two is speed; MD5 is faster to process than SHA.

Who should you contact if If your mobile computing device owned by the DOD and containing personally identifiable Information is lost?

According to DoD 5400.11-R, May 14, 2007:

C10.6.1. When a loss, theft, or compromise of information occurs (See Chapter 1 of this regulation) the breach shall be reported to: C10.6.1.1. The United States Computer Emergency Readiness Team (US CERT) within one hour of discovering that a breach of personally identifiable information has occurred. Components shall establish procedures to ensure that US CERT reporting is accomplished in accordance with the guidance set forth at www.us-cert.gov. The underlying incident that led to the loss or suspected loss of PII (e.g., computer incident, theft, loss of material, etc.) shall continue to be reported in accordance with established procedures (e.g., to designated computer Network Defense (CND) Service Providers, Chairman of the Joint Chiefs of Staff Manual 6510.01), law enforcement authorities, the chain of command, etc).

C10.6.1.2. The Senior Component Official for Privacy (Reference (a)) within 24 hours of discovering that a breach of personally identifiable information has occurred. The Senior Component Official for Privacy, or their designee, shall notify the Defense Privacy Office of the breach within 48 hours upon being notified that a loss, theft, or compromise has occurred.

In addition, most DoD entities have local policies requiring you to report the loss of the device to your supervisor and local security office.

What is the difference in the protection offered be a BIOS password vs a Login password?

A BIOS password prevents a computer from loading the operating system. A login password is prevents the user from accessing the rest of the operating system such as their programs, internet etc.

How does assigning users to groups simplify the process of administering security?

Assigning users to groups simplifies the administration of security by allowing permissions to be assigned to users based on their groups rather than having to assign permissions to each user.

What is the most insecure hash for storing passwords?

Of the conman ones in use today MD5 is the least secure.

Is kaspersky better than bitdefender?

No..... previously i used bitdefender it works better but it cannot delete the virus in packages and somewhat complex to use and to update I suggest you to use Kaspersky...... for any questions you can ask me at http://umamahesh88.blogspot.com/ UMA MAHESH

What does Bogus Websites mean?

The term "bogus website" is an informal term usually applied to a few different kinds of websites:

1) a website that is set up to mimic a legitimate website of an entity - perhaps a site meant to fool people into thinking they have reached their bank's web site. This kind of bogus web site is frequently used by miscreants who are conducting phishing attacks as a means of deceiving people into disclosing sensitive information that can be exploited for such nefarious purposes as stealing their identity, stealing money from them, stealing corporate information, or planting malware on their computers.

2) a website that is set up as a kind of Trojan Horse where people come thinking they are getting something but the jerk who set it up uses it to conduct a drive-by download of malware to the visitor's computer

3) a website that is set up to fool the user into thinking they are visiting a company or government website but which is actually being used to spread disinformation about the targeted entity. The creator(s) may conduct an attack to misdirect people to their bogus website instead of the correct website. This kind of website would probably fall under the category of either propaganda or hacktivism.

What are physical security computer components?

A physical firewall, router, modem. (if this is for a class then you might have to argue this point, a physical firewall is a piece of equipment but it is still software that does everything.)

A lock on the computer case.

What are some of the criteria that can be used to rank security risks?

Risk can be quantified by their likelihood of exploitation, the impact of exploitation. These two factors can be weighted according to what is most important to you. Normally rankings would be based on equal weightings. Impact can be further subdivided into impact in terms of lost time, lost revenue, cost to correct, lost reputation, etc.