answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is a symmetric encryption?

Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.

Definition of DNA computing in security?

DNA computing, also known as molecular computing, is a new approach to massively parallel computation based on groundbreaking work by Adleman . In November of 1994, Dr. Leonard Adleman wrote the first paper on DNA computing. In this paper, he found a way to solve the "Hamiltonian path problem," which involves finding all the possible paths between a certain number of vertices. It is also known as the "traveling salesman problem." This name comes from viewing each vertex as a city, with the problem to find all possible routes for a salesman passing through each of these cities . Computers today all use binary codes - 1's and 0's or on's and off's. These codes are the basis for all possible calculations a computer is able to perform. Because the DNA molecule is also a code, Adleman saw the possibility of employing DNA as a molecular computer. However, rather than relying in the position of electronic switches in a microchip, Adleman relied on the much faster reactions of DNA nucleotides binding with their complements, a brute force method that would indeed work A DNA computer is a collection of DNA strands that have been specially selected to aid in the search of solutions for some problems. DNA computing results in parallelism, which means that when enough DNA information is given, huge problems can be solved by invoking a parallel search

How does automatic updates help enchance security fo your computer?

Well when you update your computer it will secure your computer because windows has found errors. Sometimes there are back doors in Windows and Microsoft will send out updates to fill in that back door, so no one bad gets in. Just make sure your computer is up-to-date and make sure automatic updates are on. The Service Packs are packs of updates, almost like a mini operating system. Also, clean your computer for best performance.

You have security problem with your PC?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

candely.club/CIBCkob

Can you add a fingerprint reader to an HP laptop?

Simply asking hp is a very broad statement. Its not who's its by its what format it includes. What operating system it uses. This are the components that are going to decide it. In my opinion Yes you can a a fingerprint reader to an hp laptop in most cases. But I won't do it because it is very costly and sometimes people can not log in because of some accident.

How the firewall blocks the site?

A web firewall usually has a least of hundreds of bogus, and malicious URL or websites. If it comes across a website that is on the least than it will inform the PC user of the dangerous content before he or she actually visits it. Most firewalls in schools and business block sites by their content not by their name. this is how it works an administrator configures the firewall to block certain categories of websites. Some commonly blocked websites are audio and video sharing, proxy servers and ofcourse adult video. Firewalls are helpful when it comes to protecting your computer and the people who view it. But it is also sometimes bad. Firewalls sometimes block some sites like youtube, sites like this one and gaming. The best method is knowing what your needs are and how to configure the firewall to let you do this. Firewalls slow down performance a little but its worth it.

What is the meaning of 128 bit key in encryption?

In encryption, a key is the information used to encrypt the data. 128 bit means that the key is 128 bits long (a bit is a single unit, or "bit" of data, either 0 or 1). The longer the key, the more complex the encrypted data becomes. 128 bits is considered a strong key length.

Computer related operation in business?

Information systems are a network of computers linked to perform many different functions in business. Information systems connect the accounting, marketing and information technology departments.

How do you reset a password?

usualy when you go to login to a website there is something at the bottom that says forgot password? you click on that and fill out the info then they send you an email.

PowerPoint of lack of computer security and its effect on industryeconomy and government?

Powerpoint of lack of security of computer and its effect on industry,economy and government

What does e-safety mean?

E-saftey is all about being safe e.g. don't meet people who you don't know and don't see people who you don't know.

How can installation of a firewall give an organization false of sense of security?

Installation of a firewall can give a false sense of security, because many users do not understand the limitations of a firewall. Specifically, a firewall primarily defends against unsolicited incoming attacks: a hacker tries to access the internal network from the outside.

Firewalls often fail to effectively protect from threats from the inside: viruses (malware of all sorts, worms, etc), once active on the inside, may be able to spread within the network, and spawn network activity that traverses the firewall in both directions.

What industries depend on computer networking?

1. Airlines

2. Education

3. E-commerce

...

Pretty much all industries these days. Even farming is networked now.

Full from of ccna?

Cisco Certified Network Associate.

Where can you close your unInstall Shield?

Task Manager Right click application (UnInstall shield) click goto process then end.

What is the difference between CCNA and CCNA security?

The CCNA exam is the qualifying exam available to candidates pursuing a single-exam option for the Cisco Certified Network Associate CCNA certification

CCNA Security Certification meets the needs of IT professionals who are responsible for network security.

What is the best complete internet security suite that will not bog down your computer you currently have Mcaffe but your subscription is soon going to run out?

Definitely not Norton or Mcafee, If you want one that is not a computer hog and has good rock solid protection try PC Tools Internet security or AVG Internet security. They are both good and i have had no problems with either of them.

What are two important criteria that make a good password?

While in the process of making a good and strong password, one should ensure that it is easy to remember but contains both upper and lower case letters. The password should also contain numbers and special characters.

password should not be easy to guess.

password should be a combination of letters, numbers, and non-alphanumeric. password should use at least eight characters

Include numbers, symbols, upper and lowercase letters in passwords. Avoid any password based on repetition, letter, number sequences, usernames, relative or pet names.

You can also use a good password manager. There are many tools out there, take your pick. I use a free VeriSign secured tool called Billeo to manage my passwords. It safely stores my passwords and saves the hassle of writing them down.

Two Important criteria for good, secure passwords include:

  • Whenever possible, use at least 14 characters or more
  • The greater the variety of characters in your password, the better.

There are many important criteria but if I had to pick just two?

  1. Not a common use word or something associated with you. Ergo, not your birthday or your wife's name or your favorite dog. Not your social security number or Medical ID or anything some one would be able find out in surprisingly little time.
  2. Long and random. Make a mnemonic string. This helps make the password more "nasty" and also keeps you from forgetting the longer password.
For example..
  • "I took my future wife to the beach where I asked her to marry me."
Would become..
  • "1tkmyftrw1f32th3be@chf0rmaRr1@g3" Or what have you.

Some form of strings you can remember. You could also use the first letters like..

  • "itmfw2tbwiah2mm" is a rather strong password.