answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Is there a way for a company to know if its security measures are sufficient?

There are a lot of firms doing security testing (e.g. stress tests of your network and IT infrastructure, firewall and network penetration testing etc) - you may want to refer to a local yellow pages directory to find one-

What are the disadvantages of using insecticides indiscriminately for a long period of time?

Insecticides can be toxic to humans. and if used around food, chemicals can enter your food which is unhealthy for the body. Insecticides can be toxic to humans. and if used around food, chemicals can enter your food which is unhealthy for the body.

Which software are downloaded legally and ethically from the internet for free?

Software that can be downloaded free and legally are:

1: Open Source software (Though not all software that is open source is free)

2: Freeware

3: Shareware

4: Software trials

How do you optimize network performance?

take a inventroy of applications that use the internet make sure you have no torrents or p2p software running

upgrade older network hard for example upgrade switch from hub

What is a cracked serial?

A "Cracked Serial" is a serial number (normally for software) which has been obtained illegally.

Asking for, Describing How, Or Submitting serials is illegal and doing so on WikiAnswers is strictly prohibited.

How is cryptography used by the security services?

Cryptography is used by the security services to protect the confidentiality (secrecy) of sensitive information that could do harm to the nation and its citizens if it were disclosed to the public (which would then make it available to the nation's enemies). Messages sent by computer or over tactical radios etc. are first encrypted. Only those who have a need to know and are authorized should have the key necessary to decrypt the.message and use the information in it.

What is authentication on network?

authenticatinn means to check the authication ,whether you are right or not ,in network we use this in email addres where we have to give our id and password

What is the difference between advanced encryption algorithm and scalable encryption algorithm?

Scalable encryption algorithm uses only elementary operations commonly found in microcontrollers - addition, logical AND, OR and XOR, rotation and moves. Thus, implementation of the cipher is straighforward and small, while performance is good.

Similarly to the vast majority of modern blok ciphers, also SEA is a Feistel cipher, but with a simple structure and maybe unusually high number of rounds. As it is only a few months old, there seems to be no independent cryptoanalysis yet, but the authors analysed it for several modes of attack quite exhaustively.

An unusual feature of the cipher is, that it takes into account the native word length of the microcontroller, thus defines e.g. 8-bit, or 32-bit version of the cipher. This increases the ease of its implementation. Although the different word-length versions are mutually incompatible, in the most common scenario this is not a big drawback, as the typical counterpart of the microcontroller is a bigger system (e.g. a PC) with abundant resources, where optimum implementation is not necessary.

Another remarkable feature of the cipher is - as its name indicates - its scalability. It is not an unheard-of feature - for example, one of the requirements for AES was to have variants of the cipher with respect to both block length and key length. But SEA is designed so that it enables virtually any block and key length, provided that both are equal and multiple of 6 word lengths. Of course, in practice a limited set of word length and block/key length will be used, for example the authors compared 96-bit SEA on 8-bit microcontrollers and 192-bit SEA on 32-bit microcontrollers. However, as requirements on key length increase yearly due to advancing technology used (potentially) for brute-force attacks, SEA offers a quick and easy upgrade path.

A minor - but handy - peculiarity of SEA is, that after performing the whole key schedule (i.e. a complete encryption or decryption cycle), the key returns to its initial state. It means that the key does not require any extra memory - it can be stored in the place where it is used.

While attempting to implement the cipher on two popular 8-bit platforms - x51 and AVR, the rather mathematically-oriented notation used by the authors caused confusion in several cases. For example, in the substitution, the "recursivity" means, that in the three consecutive steps the already modified values obtained in the previous steps are used, rather than the original value of the data/key. An another maybe confusing thing is the notation of the rounding (the "half-finished" square bracket) which was due to poor print overlooked; while it is easy to describe the algorithm with no rounding altogether (as the number of rounds is by definition always odd).

The presented implementations are written in assembly language of the respective microcontroller and are optimized for speed, resulting in several times larger code than if the author's guideline was followed. The rationale behind this decision is, that even in this way the code size is well below 1 kbyte and in modern microcontrollers the code memory (usually FLASH) comes very cheap in multi-kilobyte chunks. Also, one-way process is given as the reference implementation (only encryption or only decryption - often only one of them is used in embedded applications), although the both-way version is presented, too, coming at a small penalty in size and some decrease in performance.

What is perimeter physical security?

Physical Security is the protection we provide for the buildings, property and assets against intruders. When designing a physical security program, the three levels you need to protect are your outer perimeter, your inner perimeter and your interior. The outer perimiter of your property is defined by your actual property lines.

Perimeter security is a set of physical security and programmatic security that provide levels of protection against remote malicious activity.

Perimeter security is enforced in the following areas:

  • Physical Access Control. The security devices and policies that are enforced for physical access control prevent the spread of viruses through portable storage devices, help protect data on the phone and the Subscriber Identity Module (SIM) card.
  • .cab Signing. .cab file signing provides a more secure method of packaging and delivering applications in Windows Mobile Standard. By signing the .cab files for downloads, Windows Mobile Standard can verify the source and integrity of the file.
  • Device Management. The security policies that are enforced for device management help to protect the device from threats that may originate from over-the-air (OTA) downloads or push messages.
  • Microsoft® ActiveSync®. The RAPI policy that is enforced for ActiveSync operations helps to protect against application-level threats.
Removable Storage Card Security

What are some computer security standards that should apply in the classroom?

Computer screens that are easily monitored, use of passwords, and logging in and out of secure network systems, along with videotaping of lab areas, all help remove the opportunities for technology misuse in the media center or classroom.

How do you wipe everything off a dell inspiron including account information and security code?

Use a tool that allows you to do a low-level format of the hard drive, preferably a drive wipe. This is a bit of software that lets you write over a physical drive with 1's and 0's in a random pattern. Some times it repeats the process several times to ensure data can not be recovered from the device.

I recommend the tool "Ultimate Boot Disk" which is a bootable ISO image that contains a number of tools, some of which can do what you're asking for.

How do users hack other users account?

The most common form of 'Hacking' users accounts on websites, or computers is simply to acquire that users password. It is reasonably simple and unglamorous, very unlike anything seen in the movies.

The other way is can be achieved is to exploit venerabilities in the system to bypass user passwords or to retrive the password once access to the users data is achieved. This is not realistic for most. Trying to hack major companies websites is close to impossible. They may even be able to track your IP adress, and find out who you are, and prosecute you.Never tell them your user name,Email, or Password.Onely your parents should know those not you friend. Or your best best best friend just your famliy.

What software is designed to close logical ports in your computer?

A Firewall. Some systems like Windows come with a sort of firewall, but your will probably find something much better from a third-party company, some of which are free. Sygate used to be good, but I think it's gone now. I've heard Comodo free and Online Armor are good ones available now.

What to study for computer security job?

Study computer science, networking, programming, and ethical hacking for about 7 years or so. That should be enough to get you started.

Describe two situations when you might want to use remote desktop connection?

To fix a computer without actually being at the computer or to help someone else work on their computer while using your computer.

When do you think computer security should be applied or needed?

If a computer ever receives data from any source outside the computer or provides data to an outside recipient - computer security is needed. Since that includes the operator at the keyboard, that means just about every computer needs security. A few devices that have internal computers built into them which receive no outside data and supply no data outside of the device MIGHT get away with no security - but even there some security would be prudent to prevent malicious reprogramming of the internal computer.

When computers were being developed, the main goal was just to get them to work, not to make them "secure". As a consequence there are a lot of avenues to attack computers. The question is not so much IF a computer needs security - it is more a question of HOW MUCH security the computer needs. The degree of security a computer ought to have depends on how valuable the information on the computer is, how critical it is to protect the information from being divulged to unauthorized persons, how important it is that the information remain unaltered (You don't want errors in the data in the computers of the bank where you have an account), how important it is to be able to prove someone sent or received data (for example you want there to be proof that you sent your electronic payments and for the recipients to not be able to deny that they received them), and how critical it is to be able to get data into a computer or out of it when you want to (Any student who had their computer crash just as they were about to print out their term paper can sympathize with this one - just knowing the paper is stored on the computer doesn't help you if you can't get it out. If you include computers that run life support systems, you can see that there are even more critical systems that need to be protected such that they continue to function no matter what).