answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is administrator privileges when trying to install a download?

Answer

Administrator privileges allows the user full access to a program or network second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able use a program, but not upgrade it. If you are installing a file or program and you don't have administrator privileges, you may not be able to install the program or file. If you don't have administrator privilege, you may not be able to change computer or network defaults.

To get privileges if your running vista

start menu\click on your display picture top right\turn on or off user account\tick the UAC box

What are some good passwords 6-16 characters?

make up a password that has not got things that your parents or anybody know about. And put some CAPS numbers and these ~ ! @ # $ % ^ & * ( ) _ - + =.

and i have some suggestions like Il0vethexb0x or Ih8myj0b or Cert34me or il0vethew11 and lots more but these or my dads passwords on his PC so i hope that helps.

What is the best way of referring to the output of a secure hash function?

The output from a hash function is referred to as the hash value, hash code, hash sum, checksum or just plain "hash" as in "the hash of the file is...". Generally a hash function is presumed to be secure or it wouldn't be used. If a hash is not secure it could be referred to as "worthless" or "false sense of security".

How do you completely get rid of files on your computer?

I assume what is meant is how to delete a file such that it cannot be retrieved or "undeleted". To do this you can use any of a number of software programs (often included in security suite programs along with a firewall. antivirus etc. although there are programs specifically for completely erasing files). These programs work by overwriting all contents of the file multiple times, making it almost impossible for it to be retrieved. (Normal deletion only deletes the first character of the filename, which tells the OS that the space on the hard drive used by the file can now be used when you save other files -- this saves system resources vs. erasing all the bytes of the file, but obviously is not secure if the file contains confidential data.)

What are the differences between the control panel and the task manager?

The control panel provides access to applications that allow the management of the computer. The task manager allows for controlling the processes running on the computer - starting them and stopping them, as well as getting metrics on the running processes and applications.

A firewall policy should only be concerned with in-bound (ingress) traffic. True False?

No - firewalls should include rules for both inbound AND outbound traffic to adequately protect networks.

Can you help me make a good password?

It depends what the password is for. A 'good' password should consist of at least 10 characters. It should be a mixture of letters and numbers - but NOT something that could be guessed by someone who knows you. For example - the password I use to access my bank account online... has ten characters - and comprises 6 letters and 4 digits. I have NEVER revealed it to anyone - which makes guessing it almost impossible !

Whatever password you choose - it should be something that you can easily remember - but nothing too obvious. How abut the name of your first pet... plus the year you were born.

Just for reference... a 10-digit alphanumeric password has...3,656,158,440,062,976 possible combinations !

What is the Key reason for public disclosure laws?

The key reason for public disclosure laws is to promote transparency and accountability within government and private organizations. By requiring entities to disclose information, these laws empower citizens to make informed decisions, enhance trust in public institutions, and deter corruption. They also facilitate better governance by ensuring that stakeholders have access to essential information regarding policies, financial activities, and potential conflicts of interest.

What is a type of program that is designed to collect information about you and send it to a remote user without your knowledge?

The programs called "spyware" record information about your computer use and forward it to another user, typically one unauthorized to collect this data.

What do Physical security standards include?

From NIST 800.53 rev 4:

Physical and Environmental Protection Policy and Procedures

Physical Access Authorizations

Physical Access Control

Access Control for Transmission Medium

Access Control for Output Devices

Monitoring Physical Access

Visitor Access Records

Power Equipment and Cabling

Emergency Shutoff

Emergency Power

Emergency Lighting

Fire Protection

Temperature and Humidity Controls

Water Damage Protection

Delivery and Removal

Alternate Work Site

Location of Information System components

Information Leakage

Asset Monitoring and Tracking.

==========

Physical access control to spaces where computer assets (computers, networking connections, cabling, etc.) are present.

Physical protection of documented information about instituted protections.

Environmental protections of computers and users to protect availability and integrity (for example, EM interference can compromise integrity of transmitted information)

Physical protections against eavesdropping, interception, alteration, and interference

Tamper evident seals

Protection from physical threats (for example: protecting data center from fires, floods, tornadoes, etc.)

Protection of storage media (tapes, disks, drives, etc) - access control, theft prevention, protection against damage

What is a website that is set up to look exactly like another website with the intention of tricking customers into entering their personal information?

Such a website is usually called a "phishing website" because users are usually sent to them via a phishing message. It can also be legitimately called a "malicious website" because the information harvested from it is then usually used as part of an identity theft.

What is the phrase of hacking where the attacker creates a profile of the target and what else is it referred as?

The phrase is "social engineering" where the attacker manipulates people into providing confidential information or performing actions that compromise security. It is also referred to as "phishing" or "pretexting."

What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load?

The component of UEFI that helps prevent malware from hijacking a system during or before the operating system load is Secure Boot. Secure Boot ensures that only trusted software, such as the operating system and its bootloader, is allowed to run during the boot process. By verifying digital signatures of the boot components against a list of trusted certificates, Secure Boot helps block unauthorized code from executing and protects the system from potential malware attacks.

This method of impersonating a legitimate organization?

When internet fraudsters impersonate a business to trick you into giving out your personal information, it's called phishing. Like any kind of fraud, it is a crime, but the difficulty of catching the fraudster is increased due to the insulation of the criminal from the target by transient nature of thee accounts they launch their attacks from

What sources could you use as a source to perform the MBSA security scan?

You could use the Microsoft Baseline Security Analyzer (MBSA) tool to perform security scans on Windows-based systems using official Microsoft documentation, security bulletins, and security best practices as sources of information. Additionally, you can utilize vulnerability databases and industry-recommended security standards for reference during the scanning process.

Who demands payment to stop an attack on an organization's technology infrastruture?

Someone creates ransomware, which inserts a virus onto your computer and demands cash to fix it. Avoid clicking on the message and close it using task manager and you may avoid having it download. Also, do not "resume previous session." It is prevalent in Europe, but there is a fair amount of occurrence in the US.