answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is the difference between private key and secret key as applied to coding theory and cryptology?

"Private key" in the context of cryptography refers to the the key generated for an asymmetric encryption algorithm which is retained by the owner while the companion "public key" is published for others to utilize for secure communications or authentication. The "private key" is not shared with anyone.

A "secret key" in the context of cryptography refers to the single key generated for use in a symmetric encryption algorithm which is only shared between those between whom secure communication is desired. It is kept secret from all others. The secret key must be transmitted to or shared with all parties by a method outside the communications link it is intended to secure.

Is there a way to download and run an IRC client without administrator privileges?

If your computer is properly configured from a security standpoint, you may be able to download the installation file but not run it. The installation of the IRC client will require administrator privileges because it changes computer settings and opens ports for communications. Because IRC connections are usually unencrypted and typically span long time periods, they are an attractive target for hackers. Because of this, careful security policy is necessary to ensure that an IRC network is not susceptible to an attack such as an IRC takeover war. IRC can also be used for file sharing, so secure networks will block most or all IRC traffic to prevent exfiltration of sensitive information - which is another reason they should prevent non-administrators from installing IRC clients on their machines. Even if you already have an IRC client on your computer, if you connect it to a network that enforces blocking of IRC traffic you still will not be able to communicate via IRC over that network.

What is a local database?

A local database is a database that is stored and managed on a local device, such as a personal computer or a server, rather than being hosted on a remote server or in the cloud. It allows for quick access and manipulation of data without relying on internet connectivity. Local databases are often used in applications where data needs to be processed quickly and where security or privacy is a concern. Examples include SQLite for mobile applications and Microsoft Access for small-scale projects.

Examples of public key cryptography?

Public Key Cryptography is a method of secure communication. It involves the creation of both a public and a private key. When sending a message, the sender encrypts the message with the recipients public key. After receiving the message, the recipient may then decode the message with his/her associated private key.

One area that public key cryptography is used in is SSL / TLS (Secure Socket Layer). An example of an SSL library is the CyaSSL Embedded SSL Library. CyaSSL provides several public key cryptography options, including RSA, DSS, DH, and NTRU.

In addition to SSL, Public Key Cryptography is used in a large variety of techniques, algorithms, and protocols including:

Diffie-Hellman key exchange protocol

RSA Encryption Algorithm

Cramer-Shoup cryptosystem

NTRUEncrypt cryptosystem

GPG, OpenPGP

Internet Key Exchange

PGP

Why do cryptologists recommend changing the encryption key from time to time?

to re-protect our data and to save from key tampering (man in middle attack)

What is the public key concerning your cac?

The public key concerning the CAC refers to the authorized key that is open to all the concerned people. The encryption procedure ranges according to the key.

How many keys are required for two people to communication via a cipher?

That depends on whether you use a symmetric (shared key) or asymmetric (public/private key pair) algorithm.

If you use a symmetric key, it means both people have the same key which has been pre-shared via some secure means. In that case, only one key is required; both parties in the communication use the same key to encrypt and decrypt all messages.

If you use an asymmetric key algorithm, it takes at least 4 keys total: when sending a message each user will encrypt their message with the public key of the recipient (that accounts for two of the keys). Each recipient must then use their private key to decrypt the messages they receive (which accounts for the other two required keys).

What do securities brokers do in addition to buying and selling securities?

In addition to buying and selling securities, brokers can advise and educate their clients on investments, saving for retirement, and tolerance for risk. Overall, brokers spend a great deal of time marketing their services and products

What is number 1 password be security?

If you want the most often used passwords, it looks like 123456 and password are the top two on the list, that I found.

What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.

How do you launch a coordinated DDos attack?

Using software such as LOIC (Low Orbit Ion Cannon), many people can launch an attack against a website, server or router at the same time. This is a coordinated DDoS attack.

DoS and DDoS attacks are illegal under the law.

Which can be used to launch a coordinated DDoS attack?

HOIC (High Orbital Ion Cannon) can be used to launch both DoS and DDoS attacks. DoS and DDoS attacks are against the law, so I advise you that if you don't want to get arrested, you shouldn't execute one. Obviously you will be caught in the act if you do because you are a n00b.

What does it mean when it says 7 characters long and contain at least 1 number?

Characters are letters, numbers or symbols, not including spaces.

You are being asked to create a password that is made up of 7 letters, numbers or symbols that has at least one number in it.

Examples:

  • greyparrot3
  • mous3_and_chee$e
  • 6GummyBears
  • Seven_7

What can be used to launch a coordinated DDoS attack?

Basically, you just need a lot of computers. Not four of five, but more like a server farm. You will also need a program to drive each computer, telling it to download over and over.

--Please don't try it.

What is the correct definition of Differential backup?

A differential backup backs up all changes since the last full backup. To restore everything only the last full backup and the last differential backup are needed.

What are the two names of the most popular hashing algorithms?

Both SHA-1 and MD5 are good hashing algorithms. The primary difference

between the two is speed; MD5 is faster to process than SHA.

Who should you contact if If your mobile computing device owned by the DOD and containing personally identifiable Information is lost?

According to DoD 5400.11-R, May 14, 2007:

C10.6.1. When a loss, theft, or compromise of information occurs (See Chapter 1 of this regulation) the breach shall be reported to: C10.6.1.1. The United States Computer Emergency Readiness Team (US CERT) within one hour of discovering that a breach of personally identifiable information has occurred. Components shall establish procedures to ensure that US CERT reporting is accomplished in accordance with the guidance set forth at www.us-cert.gov. The underlying incident that led to the loss or suspected loss of PII (e.g., computer incident, theft, loss of material, etc.) shall continue to be reported in accordance with established procedures (e.g., to designated computer Network Defense (CND) Service Providers, Chairman of the Joint Chiefs of Staff Manual 6510.01), law enforcement authorities, the chain of command, etc).

C10.6.1.2. The Senior Component Official for Privacy (Reference (a)) within 24 hours of discovering that a breach of personally identifiable information has occurred. The Senior Component Official for Privacy, or their designee, shall notify the Defense Privacy Office of the breach within 48 hours upon being notified that a loss, theft, or compromise has occurred.

In addition, most DoD entities have local policies requiring you to report the loss of the device to your supervisor and local security office.

What is the difference in the protection offered be a BIOS password vs a Login password?

A BIOS password prevents a computer from loading the operating system. A login password is prevents the user from accessing the rest of the operating system such as their programs, internet etc.

How does assigning users to groups simplify the process of administering security?

Assigning users to groups simplifies the administration of security by allowing permissions to be assigned to users based on their groups rather than having to assign permissions to each user.

What is the most insecure hash for storing passwords?

Of the conman ones in use today MD5 is the least secure.

Is kaspersky better than bitdefender?

No..... previously i used bitdefender it works better but it cannot delete the virus in packages and somewhat complex to use and to update I suggest you to use Kaspersky...... for any questions you can ask me at http://umamahesh88.blogspot.com/ UMA MAHESH

What are physical security computer components?

A physical firewall, router, modem. (if this is for a class then you might have to argue this point, a physical firewall is a piece of equipment but it is still software that does everything.)

A lock on the computer case.