answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Sample data flow diagram for super market system?

These can be found online. You might want to do an image search for the industry or business that you want this information for.

How does asymmetric encryption provide confidentiality?

Asymmetric encryption can provide confidentiality in two ways:

1) messages encrypted using the public key of the recipient can only be decrypted using the private key of the recipient - which only the recipient should possess.

2) It can be used as part of a negotiation process between two users to establish a temporary shared key through a process such as the following:

  • User A sends a challenge message to user B which is encrypted with user B's public key to initiate secure communications.
  • User B decrypts the message and sends the correct response back to user A encrypted with user A's public key
  • The two users are now authenticated to each other
  • At this point A can send a proposed symmetric key to B encrypted with B's private key
  • All further communications are encrypted via the shared symmetric key

In this second scenario, the asymmetric encryption only facilitates the establishment of confidentiality via the eventually shared symmetric key by securing the initial negotiations.

What are some security measures for home computers?

Physical security measures are those which are taken to protect assets from physical theft, loss, or damage, and is not limited to computers - the concepts can be applied in any setting where security is desired. A locked door is the simplest form of physical security control, and can be layered with CCTV, explosion prevention, spikes/barbed wire on walls and rooftops, card swipes, biometric scanners, moats, vault doors, or other types of intrusion prevention systems. Automated machine gun defenses are even in place at highly secured facilities.

On a basic level, securing workstations can be accomplished through the use of cable locks, security pads affixed to furniture, and even security personnel.

How do you set up a network firewall?

You can setup your network firewall with your accessing router. consider you are using the Belkin Router : than follow these steps :

Access the Belkin router setup utility via the web browser. For doing that, browse the Internet and enter the '192.168.2.1' in the browser's address bar. Click 'Enter' to continue. On the login web page, type your router password and click the 'Submit.'

On the setup page, click the 'LAN Setup' menu in the left corner window. Now, you can see the current configuration of the firewall of the router. In Features section, check that the firewall is turned on or not.

Once you assure that the firewall is not enabled, click the 'Firewall' menu to display the firewall settings on the screen. Click the 'Enable' button to select it and then 'Apply Changes' to save your settings.

That's all process allow you to enjoy setup the firewall on the Belkin router and the safety and protection when online or offline.

What is a password hint?

A good password hint is something that would confuse other people when they read it, but when you read it, you immediately know what it means and what your password is. That way, people can't guess your password but then you know what it is after you read your hint.

What is the full meaning of CCNA?

CCNA is the acronym for the Cisco Certified Network Associate certification from Cisco.CCNA certification is a second-level Cisco Career certification . CCNA certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN

Does shrink wrapped software from major need to be scanned for infections?

If the install disk is still wrapped from a major software provider, then no, you shouldn't need to. Doing so would not harm anything, but you shouldn't need to scan something like an install disk for Microsoft Office. Even if a CD or DVD is not wrapped, but you know it came from a reputable source, like Adobe, you should not need to scan it.

How do you catch a hacker?

Email hackers are generally tracked by Cyber crime police. They can track the IP address of the hacker. With the IP address, they can track the location of person.

Advantages and disadvantages of having international standards for network protocols?

Advantages:

  1. The adoption of international standards for network protocols results in the creation of equivalent, national standards that are substantially the same as international standards in technical content
  1. International standards is one way of overcoming technical barriers in international commerce caused by differences among technical regulations and standards developed independently and separately by each nation, national standards organization, or company. Technical barriers arise when different groups come together, each with a large user base, doing some well-established thing that between them is mutually incompatible.

International standards organizations remove any political advantage by publishing their network protocols publicly, and usually for free.

Disadvantage:

  1. International standards provide connections to different computers at different part of the world. So this may lead to differences such as appearance, o.s, and many other factors which results into conflicts in governmental regulations.

Why is using an ActiveX control considered a security risk?

Because it is designed to have access to the core components of Windows

What is the purpose of the administrator password?

The computer needs at least one account with full privileges in order to allow the installation of software. By default, the computer will come with such an account - the default administrator account. Since the account has full privileges it really needs to be protected such that only someone who is supposed to have full privileges on the machine can access it. The protection comes in the form of password protecting the account.

What are ten industries that depend on networking?

1. Airlines

2. Education

3. E-commerce

4.Apple Company

5.Banking Maintains.

6.Super Market Controlling

7.CCTV Security Organization

8.Laptop Company

9.BBC

10.BT Telecom

Purpose of the UAC box in Windows Vista?

UAC is the User Account Control. That is an added security measure to prevent certain manipulations to the system. That would include messing with the system root or the program files, adding or removing programs, installing drivers, installing ActiveX controls, adding or removing user accounts, configuring Windows Update, running programs with Administrator privileges, changing another users files, defragging the drive, etc. It is a way to temporarily grant Administrator privileges without having those privileges available all the time. That way, malware cannot do those things.

What security software should your computer have?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

cutt.ly/bh7OIkg

Is ethical hacking course and network security courses the same?

No, CCNA (Cisco Certified Network Associate) is an certification that validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN.

Security ethical hacking, goes more in detail about computer/software/network security.

What is difference between user privileges and permission?

As the question was posed in the Windows section, I'll answer this from Microsoft's perspective.

User rights generally refer to logon capabilities: who can logon interactively, as a batch job, as a service, over the network, over Terminal Services, etc. These all require a certain "right" and these rights can also be denied to groups or individual users.

Permissions relate to the capability of accessing an object, such as a file, a registry entry, a service, a printer, a share, etc. Again these can be granted or denied but there is more granularity here as there are several permission types: read, write, delete, etc. Permissions are collected into Access Control Lists (ACLs) with each entry being termed an Access Control Entry (ACE).

To complete the trio in common parlance, there are privileges. These relate to overriding capabilties within Windows such as backup, restore, take ownership, debug, etc. If you hold the backup privilege, for example, you are allowed to read all files, regardless of permissions on those files. Privileges trump permissions.

Confusingly, privileges are sometimes referred to as rights, even in official MS documentation. in the days of NT4, some were also called "abilties" so you'll note the careful use of the generic term, "capability" above.

And finally, in the Novell world, permissions are called user rights.

Which file system is specially design to provide more security?

Generally, you are referring to the class of Filesystems known as Cryptographic file systems. A crypto filesystem uses a symmetric algorithm to encode the contents of disk; it requires a special key to be able to use.

Several common filesystems now support a Cryptographic mode.

How do you remove McAffe from PC?

Start>My Computer>Local Disk>Program files>McAfee>McAfee Shared components>Shedder << delete this folder For those of you trying to install Norton but it keeps telling you to uninstall McAfee Shredder first, I came across the easiest answer that worked straight away for me. Go download this freeware registry cleaner: http://www.majorgeeks.com/download.php?det=460. On the Uninstall Menu, remove McAfee Shredder and it takes care of it immediately.

How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works.

An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages.

Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to.

To get more details on the mathematics of encryption and decrption using Public Key

Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

How do you set your laptop to lock when you close your screen in Windows 7?

Hold Windows key and press L

That will lock your account.

If your account is password protected then you will get a password prompt to enter that account again.