What are the roles of Public and Private Key?
A user's private key is kept private and known only to the user. The user's public key is made available to others to use. The private key can be used to encrypt a signature that can be verified by anyone with the public key. Or the public key can be used to encrypt information that can only be decrypted by the possessor of the private key
What kind of attack that the attacker is able to access administrator-level resources as a result?
Privilege escalation
When should a technician perform penetration testing?
It varies and depends on the complexity of your systems, but most companies would check their systems with a penetration test at least once a year. Make sure to make it a yearly habit in order to protect youru computer systems from malicious hackers.
What does the Logon Hours property of a user account control?
During valid logon hours, users can work as they normally do. They can log on to the network and access network resources. During restricted logon hours, users can't work. They can't log on to the network or make connections to network resources. If users are logged on when their logon time expires, what follows depends on the account policy you've set for them. Generally, one of two things happens to the user:
Forcibly disconnected You can set a policy that tells Windows 2000 to forcibly disconnect Windows 2000 users when their logon hours expire. If this policy is set, remote Windows 2000 users are disconnected from all network resources and logged off the system when their hours expire.
Not disconnected Users aren't disconnected from the network when they enter the restricted hours. Instead, Windows 2000 simply doesn't allow them to make any new network connections.
Access the user's Properties dialog box in Active Directory Users And Computers and then choose the Account tab.
Click the Logon Hours button. Set the valid and invalid logon hours using the Logon Hours dialog box shown. In this dialog box each hour of the day or night is a field that can be turned on and off. To change the setting for an hour, click it. Then select either the Logon Permitted or Logon Denied option button.
Hours that are allowed are filled in with a dark bar.
Hours that are disallowed are blank.
Who are gray hat hackers in India?
One of the new great Grey hat hacker that I know is Gurcharanjit Singh Punjab/India. He is currently doing engineering degree in computers. He's currently not engaged with a particular organization and working independently. He is published many times by UK's most popular magazine EETimes.
What are the characteristics of a strong password?
Actually, it would be considered stronger to use a pass phrase. Use several easy to type words that make up more than 25 characters and use a special character or two like the ones above your number keys.
Uses uppercase, lowercase, numbers
Does not use any part of the user's name
Uses non-alphanumeric characters
What is the role of data manager in dbms?
DBMS stands for DataBase Management System. So it's role is basically to manage the database. More specifically this software controls the storage, organization, retrieval, integrity and security of the data in the database.
The KOV-26 Talon is Type-1 encryptor manufactured and sold by L-3 Communications. It is a PCMCIA card that encrypts traffic sent through it (an in-line Network Encryptor). It is primarily intended for use with mobile computers such as laptops, although it can be used with desktop computers as well. Is is sold with adapters that allow it to connect to Ethernet, WiFi (802.11 b/g), dial-up modem (V.90), and serial (RS-232). It is capable of using a variety of key management protocols.
It can be used to encrypt communications up to and including TS/SCI. As such, it is a COMSEC Controlled Cryptographic Item (CCI) releasable to CCEB Nations and NATO - U.S., U.K., Canada, Australia, and New Zealand.
Modern operating systems can have their interface "locked" so that the user logged in will not have their files looked at while they are away. This is enabled by default on most new operating systems as a security feature, but can be disabled by checking the screen saver or power saver options. You may turn this feature off if you would like, but it's generally considered a good idea to keep it on, as a matter of security.
Merit and limitation of password guessing?
Password guessing is usually more of an art or a brute force method of cracking a password. As such it doesn't require much sophistication - anyone can guess at passwords - but it is extremely limited and unlikely to correctly guess passwords created with proper complexity.
What is the sanitation process recommended by the DoD 5220.22-M standard?
5220.22-M does not specify a standard, only that media that stored security-clearance required files must be sanitized. The Defense Security Service defines the Clearing and Sanitization Matrix, which actually specifies what actions must be taken for various types of media.
When in sleep mode can your security access the computer to run sweeps etc?
When a computer is in Sleep mode, the programs are ready to run again but do not actually run. Therefore scans cannot be done in Sleep mode with conventional Antivirus software.
What kind of password is easy to remember but hard to guess?
A well chosen pass phrase can be used to generate an easy to remember password. The password can be generated by taking just the first letters of each word in the pass phrase and adding characters and numbers (or substituting them - like 4 or @ in place of A and 1 or ! in place of L etc). The resulting password will be fairly easy to remember or recreate but tough to guess.
Go to "Tools" then "Internet Options" then go to the "Content" tab and click parental controls
How can I stay safe when using ICT at home?
you can choose an security program to protect your computer from potential viruses and other threats from malicious software in real time, also your important or private data can be protected. i just use the program "avast! Internet Security ", which is powerful, and i can surf the Internet freely and don't worry about all the time, you can have a try. Good Luck!
If you can't find one, plz visit the following site:
http://www.globalshareware.com/Internet/Online-Privacy/avast-5-Internet-Security.html
How can you stay safe when using ICT at home?
you can choose an security program to protect your computer from potential viruses and other threats from malicious software in real time, also your important or private data can be protected. i just use the program "avast! Internet Security ", which is powerful, and i can surf the Internet freely and don't worry about all the time.
Why does joining your City network give up a lot of privacy?
Typically City networks are not locked down as completely as say a corporate network. They do not protect information on who is connecting to the network - thus less privacy. Their records are more open to the public than a corporate network. You need a subpoena to get the records from a private company. A city can give their records more or less to anyone they want.
How many numbers is in a security code?
brobably 4 or 5 numbers mainly they input their dob it means six numbers.
What is the purpose of the Microsoft baseline security analyzer?
The Microsoft Baseline Security Analyzer is a program that attempts to assess some aspects of the security of an individual computer. It does this by checking two things: whether security updates released by Microsoft have been applied, and whether certain less-secure security settings are present. The security settings are assessed from a fixed list of registry and program checks.
Why is password length important?
As the length of the password increases, the amount of time it takes to find it through brute force increases exponentially.
What are three actions you should take if you are victimized by online fraud?
There are many steps one might take, but I will go over just a few.
1) Cancel any credit card used in the fraud at once, contact the provider and let them know you suspect fraud and they can lock the card, provide a knew one and track any attempts to use the stolen information. Credit card companies are exceedingly good at this.
2) Change any/all passwords at once. You should be doing this regularly anyway, I recommend a three month rotation but you could probably be safe just switching them once in a while or more often for the truly paranoid.
3) If you suspect identity theft, contact the three main credit tracking agencies (Equifax, Experian and TransUnion) and report identity fraud and have them lock your credit report down. This will prevent you from opening any new credit but it will also prevent the thieves from doing so as well.
Those are a good start. There is a wealth of info out there, keep looking.