answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How can removable and non-removable media prevent hardware malfunction?

Removable media are used to transfer data between computers, creating backup copies of information and can be used to distribute commercial software between users. Non-removable media is permanently connected to the computer and provides fast access to data. It permits direct access to individual records. So its important to create a backup of data so that when the system crashes the data can be restored.

Is password sniffing illegal?

In the United States of America, intercepting any digital data is paramount to wiretapping, which is illegal except when used in conjunction with a warrant or under the Patriot Act. Actively attempting to obtain passwords can be considered a felony, with hefty fines and jail time for convictions. However, just because you came in contact with a password does not mean it is illegal, as long as it was accidental, and that leaked knowledge was not used to breach any account that does not belong to you. Installing a keylogger is illegal, but your friend saying that 'pancakes' was his favorite password is not illegal unless that information is later used to access their account without permission.

What is roaming app data?

Roaming data means collecting a network or signal from another network provider other than the original signal provider. This is generally used when someone is in abroad.

How much personal info is on your computer?

This is a relative question. There is as much personal information on your computer as you put there. Some people are not as concerned as others and put a tremendous amount of information on their personal computer. Still others vomit up mountains of information on social networking sites.

The key is, if you would not give a piece of information to a total stranger, do not pass it through your computer.

How do you provide password self service for domain users?

If you enforce a password change policy within your Active Directory domain, chances are you know plenty about the increased help desk calls from remote OWA / VPN users who have an expired password and were unable to log on to the domain, email etc.

Typically, most companies use OWA's change password function within the web interface for supporting remote user password changes. However if your password is already expired, your account is locked out, or you are a new user issued a temporary password (change on next login), there is no native method available to allow these users to self-service the issue. They must call the help desk for assistance, and remain unproductive until IT can provide help.

To easily remedy the issue and "empower" remote users with the ability to self-service password resets, account unlocks, and update a temporary password to a permanent one, you'll need to deploy a 3rd party "web based self service" software solution that interfaces with Active Directory. This type of system provides standard users with an external portal to log into and handle issues themselves quickly and securely.

Sounds easy right? The problem is, there are many solutions to choose from at varying price levels. Not all self-service systems are created equal. Some are very secure but impossible to deploy (change control nightmare). Other are easy to deploy but not secure at all, compromising perimeter security. Others are easy to deploy and secure, but impossible to build in fault-tolerance to the system or load balancing. And others still, are so completely baffling for the user to operate that it ends up causing more help calls than it was designed to reduce!!

How do you make an informed choice? Try a lot of different products. See which one works great from a "dumb user" perspective, and is "realistic" to deploy within your secure environment.

Some "not good" product features to avoid, which should help with your selection:

  • Require schema extensions / changes to AD in order to function
  • Requires windows-only computers and installation of client software to function
  • Places sensitive "administrative functions" inside the external web self service portal
  • Web self service portal has not been PCI scan tested by the vendor
  • Requires SQL or MySQL databases to store user data
  • Uses odd butchered versions of open-source code for the web self service portal
  • Does not provide for easy failover, load balancing and system redundancy
  • Does not log web portal events with specific event ID's to the server for monitoring
  • Stores sensitive user data and passwords outside of Active Directory
  • Stores sensitive user data and passwords in the external web self service portal
  • Web self service portal cannot be deployed in a DMZ outside of the secured LAN
  • Software is not designed / built by vendor (product bought from some other company)
  • No in-house support (support number goes to Philippines or India call center)
  • Uses old, cumbersome "question / answer" methods for user enrollment in the web portal (not effective)

When reviewing products, you should ask the above questions- A proper web based self service solution should not have any (or very few) of the above items present. As a yardstick of successful measure, we suggest Password Reset PRO from SysOp Tools.

With a good web based user self service solution deployed for your users that is secure, easy to install and easy for users to navigate, you will reap the benefits of less help calls, more productive users, and better overall enforcement of a secure change password system.

There are opensource tools that help the Sysadmins to forget changing them and letting the users to do it by themselves. Such as ADiPaRT. It's an Open Source Active Directory Password Reset Tool.

Can a vkey number be retrieved using the MEID or MSID numbers?

Not on a end-user level. Manufactures belive it is impossible. But for use on an educational level and not to be used piracy you can search for a keygen program for what ever you are looking for. Keygens only work for the game, OS, or software they are built for. There is no keygen that works for more than one piece of software. This is for informational or for curiosty purpose only and again not to be used for anything or any reason that is unlawfull anywhere, anytime.

How do you remove virus from ram?

RAM is cleaned when you power off your computer. Your virus is not on the RAM, it is on the hard disk and moves from there into RAM when you start up your computer. You need to remove the virus from the hard disk and then reboot it to clean the RAM.

How do you identify an anonymous commenter on a blog?

You will be notified when a new comment is posted on your blog and you can know anonymous commenter as if the name details is not available and specified there itself as anonymous.

Is there a way for a company to know if its security measures are sufficient?

There are a lot of firms doing security testing (e.g. stress tests of your network and IT infrastructure, firewall and network penetration testing etc) - you may want to refer to a local yellow pages directory to find one-

What are the disadvantages of using insecticides indiscriminately for a long period of time?

Insecticides can be toxic to humans. and if used around food, chemicals can enter your food which is unhealthy for the body. Insecticides can be toxic to humans. and if used around food, chemicals can enter your food which is unhealthy for the body.

Which software are downloaded legally and ethically from the internet for free?

Software that can be downloaded free and legally are:

1: Open Source software (Though not all software that is open source is free)

2: Freeware

3: Shareware

4: Software trials

How do you optimize network performance?

take a inventroy of applications that use the internet make sure you have no torrents or p2p software running

upgrade older network hard for example upgrade switch from hub

What is a cracked serial?

A "Cracked Serial" is a serial number (normally for software) which has been obtained illegally.

Asking for, Describing How, Or Submitting serials is illegal and doing so on WikiAnswers is strictly prohibited.

What is authentication on network?

authenticatinn means to check the authication ,whether you are right or not ,in network we use this in email addres where we have to give our id and password

How is cryptography used by the security services?

Cryptography is used by the security services to protect the confidentiality (secrecy) of sensitive information that could do harm to the nation and its citizens if it were disclosed to the public (which would then make it available to the nation's enemies). Messages sent by computer or over tactical radios etc. are first encrypted. Only those who have a need to know and are authorized should have the key necessary to decrypt the.message and use the information in it.

What is the difference between advanced encryption algorithm and scalable encryption algorithm?

Scalable encryption algorithm uses only elementary operations commonly found in microcontrollers - addition, logical AND, OR and XOR, rotation and moves. Thus, implementation of the cipher is straighforward and small, while performance is good.

Similarly to the vast majority of modern blok ciphers, also SEA is a Feistel cipher, but with a simple structure and maybe unusually high number of rounds. As it is only a few months old, there seems to be no independent cryptoanalysis yet, but the authors analysed it for several modes of attack quite exhaustively.

An unusual feature of the cipher is, that it takes into account the native word length of the microcontroller, thus defines e.g. 8-bit, or 32-bit version of the cipher. This increases the ease of its implementation. Although the different word-length versions are mutually incompatible, in the most common scenario this is not a big drawback, as the typical counterpart of the microcontroller is a bigger system (e.g. a PC) with abundant resources, where optimum implementation is not necessary.

Another remarkable feature of the cipher is - as its name indicates - its scalability. It is not an unheard-of feature - for example, one of the requirements for AES was to have variants of the cipher with respect to both block length and key length. But SEA is designed so that it enables virtually any block and key length, provided that both are equal and multiple of 6 word lengths. Of course, in practice a limited set of word length and block/key length will be used, for example the authors compared 96-bit SEA on 8-bit microcontrollers and 192-bit SEA on 32-bit microcontrollers. However, as requirements on key length increase yearly due to advancing technology used (potentially) for brute-force attacks, SEA offers a quick and easy upgrade path.

A minor - but handy - peculiarity of SEA is, that after performing the whole key schedule (i.e. a complete encryption or decryption cycle), the key returns to its initial state. It means that the key does not require any extra memory - it can be stored in the place where it is used.

While attempting to implement the cipher on two popular 8-bit platforms - x51 and AVR, the rather mathematically-oriented notation used by the authors caused confusion in several cases. For example, in the substitution, the "recursivity" means, that in the three consecutive steps the already modified values obtained in the previous steps are used, rather than the original value of the data/key. An another maybe confusing thing is the notation of the rounding (the "half-finished" square bracket) which was due to poor print overlooked; while it is easy to describe the algorithm with no rounding altogether (as the number of rounds is by definition always odd).

The presented implementations are written in assembly language of the respective microcontroller and are optimized for speed, resulting in several times larger code than if the author's guideline was followed. The rationale behind this decision is, that even in this way the code size is well below 1 kbyte and in modern microcontrollers the code memory (usually FLASH) comes very cheap in multi-kilobyte chunks. Also, one-way process is given as the reference implementation (only encryption or only decryption - often only one of them is used in embedded applications), although the both-way version is presented, too, coming at a small penalty in size and some decrease in performance.

What is perimeter physical security?

Physical Security is the protection we provide for the buildings, property and assets against intruders. When designing a physical security program, the three levels you need to protect are your outer perimeter, your inner perimeter and your interior. The outer perimiter of your property is defined by your actual property lines.

Perimeter security is a set of physical security and programmatic security that provide levels of protection against remote malicious activity.

Perimeter security is enforced in the following areas:

  • Physical Access Control. The security devices and policies that are enforced for physical access control prevent the spread of viruses through portable storage devices, help protect data on the phone and the Subscriber Identity Module (SIM) card.
  • .cab Signing. .cab file signing provides a more secure method of packaging and delivering applications in Windows Mobile Standard. By signing the .cab files for downloads, Windows Mobile Standard can verify the source and integrity of the file.
  • Device Management. The security policies that are enforced for device management help to protect the device from threats that may originate from over-the-air (OTA) downloads or push messages.
  • Microsoft® ActiveSync®. The RAPI policy that is enforced for ActiveSync operations helps to protect against application-level threats.
Removable Storage Card Security