answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What are some computer security standards that should apply in the classroom?

Computer screens that are easily monitored, use of passwords, and logging in and out of secure network systems, along with videotaping of lab areas, all help remove the opportunities for technology misuse in the media center or classroom.

How do users hack other users account?

The most common form of 'Hacking' users accounts on websites, or computers is simply to acquire that users password. It is reasonably simple and unglamorous, very unlike anything seen in the movies.

The other way is can be achieved is to exploit venerabilities in the system to bypass user passwords or to retrive the password once access to the users data is achieved. This is not realistic for most. Trying to hack major companies websites is close to impossible. They may even be able to track your IP adress, and find out who you are, and prosecute you.Never tell them your user name,Email, or Password.Onely your parents should know those not you friend. Or your best best best friend just your famliy.

How do you wipe everything off a dell inspiron including account information and security code?

Use a tool that allows you to do a low-level format of the hard drive, preferably a drive wipe. This is a bit of software that lets you write over a physical drive with 1's and 0's in a random pattern. Some times it repeats the process several times to ensure data can not be recovered from the device.

I recommend the tool "Ultimate Boot Disk" which is a bootable ISO image that contains a number of tools, some of which can do what you're asking for.

What software is designed to close logical ports in your computer?

A Firewall. Some systems like Windows come with a sort of firewall, but your will probably find something much better from a third-party company, some of which are free. Sygate used to be good, but I think it's gone now. I've heard Comodo free and Online Armor are good ones available now.

What to study for computer security job?

Study computer science, networking, programming, and ethical hacking for about 7 years or so. That should be enough to get you started.

Describe two situations when you might want to use remote desktop connection?

To fix a computer without actually being at the computer or to help someone else work on their computer while using your computer.

When do you think computer security should be applied or needed?

If a computer ever receives data from any source outside the computer or provides data to an outside recipient - computer security is needed. Since that includes the operator at the keyboard, that means just about every computer needs security. A few devices that have internal computers built into them which receive no outside data and supply no data outside of the device MIGHT get away with no security - but even there some security would be prudent to prevent malicious reprogramming of the internal computer.

When computers were being developed, the main goal was just to get them to work, not to make them "secure". As a consequence there are a lot of avenues to attack computers. The question is not so much IF a computer needs security - it is more a question of HOW MUCH security the computer needs. The degree of security a computer ought to have depends on how valuable the information on the computer is, how critical it is to protect the information from being divulged to unauthorized persons, how important it is that the information remain unaltered (You don't want errors in the data in the computers of the bank where you have an account), how important it is to be able to prove someone sent or received data (for example you want there to be proof that you sent your electronic payments and for the recipients to not be able to deny that they received them), and how critical it is to be able to get data into a computer or out of it when you want to (Any student who had their computer crash just as they were about to print out their term paper can sympathize with this one - just knowing the paper is stored on the computer doesn't help you if you can't get it out. If you include computers that run life support systems, you can see that there are even more critical systems that need to be protected such that they continue to function no matter what).

What are advantages of mini computers?

In a 1970 survey, the New York Times suggested a consensus definition of a minicomputer as a machine costing less than $25,000, with an input-output device such as a teleprinter and at least 4K words of memory, that is capable of running programs in a higher level language, such as Fortran or Basic. The class formed a distinct group with its own hardware architectures and operating systems.

What are applications of cryptography?

Cryptography is used for securing transmission of messages, protection of data, and to provide privacy and security in any situation where information is not intended for public consumption. Examples include political campaign plans, extramarital affairs, coverups, ecommerce, business transactions, and private communications.

Can police track a computer that's off?

No. without a signal it is impossible. If a stolen computer is turned on though, that is the only way the signal can be found. Same thing with cell phones.

Wireless network attacks What type of attack is most common?

It would probably be packet sniffing, although you do need to be rather close to your target to do that. My personal weapon of choice for penetration testing I have owner's consent though is a man in the middle attack where I get between the computer and the firewall and tell each one that I am the other to let them send me information. Also from afar most people would just Denial of Service your network which is sending so much information that it can't serve your users.

What are the Benefits of Cryptography in computer Security?

Without going into the fact the Cryptography has been used in some form or another for many hundreds, if not thousands of years, it's benefits when it comes to computers really come into their own. I will give some examples.

Cryptography allows us to hide information. Be it a letter, be it a file, be it a constant stream of video or audio over digital sources. Now computers are good at only one thing it's manipulating and processing truly staggering amounts of data and information of many kinds in a short period of time. Information that would take humans to work though many, many times longer.

There for the basis of breaking encryption becomes much easier with computers and logical/Turing machines which are constructed to apply mathematical force to a cytological methods until it finds the key. Normally it would take a bunch of people working on paper and pencil a insanely long time due to the complexity of modern cryto-methodology. So much so it's just not remotely feasible without some kind of computer. In fact, computer technology as we know it today is largely based on the work of men who created them as tools to, in fact, try and break codes during world war II.

So since computers make breaking codes much easier it therefore becomes necessary to use stronger and stronger methods of encryption and increasingly more complex keys. This has been a constant war for some time between those who built crypto-systems and those who break codes.

Since most of the data in the world these days flows over computers on either public or private network connection ranging from local to global it becomes necessary to have a strong, reliable encryption methods for your data because it's laughably easy for some one to just sniff packets off a network and read all the data you happen to be sending if it's not encrypted. So Crypto-systems are needed in order to maintain data secrecy (for Governments, Companies protecting intellectual property, individuals who seek private communication and yes, even criminals who seek to keep their data safe from the authorities) for the people in question.

The benefits could be compared to either pulling some one aside to speak to them privately (encrypted) or shouting the information across a crowded room (unencrypted). It all depends on your need for security and privacy.

This is a complex subject, but basically encrypting data if done correctly allows me to hide what I am saying to my friend/co-worker/boss from those I might not want to read my mail/conversations/files.

Hope that helps!

Why are computer passwords important?

Computer password is important to everybody including you because it won't be easy for hackers to hack your computer or any software you own, which is why passwords are important. They'd have to guess each time just to get it right (which would take like an eternity). It would only take an eternity if you make your password very complex, not too complex so you wouldn't remember.

In the defense in dept strategy what could be done to help prevent a system from booting into a alternate operating system?

When considering cyber security strategies we should always take a proactive risk management approach. Part of the process is identifying the threat vectors which in your case would be anything that could be used to circumvent the boot disk. On a PC, disabling any boot device (Network, CD, USB or other hard drive, etc.) other than your actual boot disk is a start. The bios setting must also be protected with at least a password to prevent someone from altering those settings. Consider putting a lock or rivet into your PC chassis to prevent someone from accessing the battery and internal components too.

These are things we do at Lazarus Alliance when helping corporations with proactive cyber security services such as IT Audit & Compliance (FedRAMP, PCI, HIPAA, SOX, SSAE 16, ISO 27001), IT Risk Management, IT Governance & Policies and Cybervisor services.

Hope this helped!