answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What are good physical security practices?

Good physical security practices include securing entry points, such as doors and windows, with high-quality locks and alarms, installing surveillance cameras to monitor the premises, restricting access to sensitive areas through keycards or biometric systems, and ensuring proper lighting in and around the property to deter intruders. Regularly reviewing and updating security protocols, conducting security audits, and providing training to employees on security best practices are also essential.

What are Multi-agent system used for?

Multi-agent systems are used for modeling and studying complex interactions and decision-making processes among autonomous agents in a decentralized manner. They are commonly used in artificial intelligence, robotics, logistics, economics, and social sciences to address problems that involve coordination, cooperation, negotiation, and competition among multiple agents.

Why is a biometric security system that relies on DNA authentication vulnerable?

If you can obtain a piece of the person - you've got their DNA so it is possible by sleight of hand to impersonate someone else. Some other drawbacks:

DNA matching is not done in real-time

Intrusive: a physical sample must be taken, while other biometric systems only use an image or a recording

Civil liberty issues and public perception

Also, DNA is extremely complex stuff so biometric security systems that rely on it have a known risk of false negatives.

What is the difference between diffusion and confusion?

In diffusion, the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext. This is achieved by having each plaintext digit affect the value of many ciphertext digits, which is equivalent to saying that each ciphertext digit is affected by many plaintext digits. Confusion seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible, again to thwart attempts to discover the key. Thus, even if the attacker can get some handle on the statistics of the ciphertext, the way in which the key was used to produce that ciphertext is so complex as to make it difficult to deduce the key. This is achieved by the use of a complex substitution algorithm.

What are the characteristics of passive barrier systems PHYSICAL SECURITY?

Passive barrier systems for physical security are stationary physical barriers that block or deter unauthorized access to a facility. They are often permanent and require minimal or no human intervention for their operation. Examples include fences, walls, bollards, and vehicle barriers designed to prevent or delay unauthorized entry.

What is the purpose of physical security systems?

Physical security systems are put in place to protect people, assets, and property from unauthorized access, theft, vandalism, or harm. These systems are designed to deter potential intruders, detect any security breaches, and provide a timely response to security incidents. Overall, physical security systems help to create a safe and secure environment for individuals and organizations.

What type of Social Engineering attack uses email to direct you to their website where they claim you need to update or validate your information and threatens dire consequences if you don't?

A phishing attack tells you to go to a counterfeit copy of a legitimate web site and enter private or security information that will be used for identity theft or to access and take your financial resources.

All users should be alert and report what?

Users of credit cards should be alert and report unauthorized activity that occurs on their account. They should also make sure the charges are accurate and in the right amount.

How much can you expect to make with a master's degree in gerontology?

If cash is what your after, then you can likely get a nursing home adminitrators certification and make between 75-100k a year. Or, you could finish your PHd and go into medicine and make 5 times as much. If cash is not your primary goal, you can work for any of a myriad of non-profits that work with our nations aged population. Working for a non-profit means a little less cash, but probably more job satisfaction. So if you apply Maslows Hierarchy of Needs, then you should be able to decide what will work best for you. :-)

How many people have been hacked?

It is impossible to give a precise answer to that. It is likely that most people who have been hacked don't even know about it, consequently they don't report it and so it can't be counted. It would not be too far wide to assume that most people have been hacked to some degree. It's more a question of "how bad" rather than "if" they have been hacked. If you want a rough estimate, take the number of people on the earth, multiply by the fraction who have accounts (from what I can find, it looks like ~39%), then multiply that by 60%-80% and you will get a reasonable range. If you need a single number I suggest : 7,274,000,000x0.39*0.7 = 1,985,802,000 as a conservative estimate

Is hacking a game legal?

Hacking a game is generally illegal as it violates the terms of service and copyright laws of the game developers. Engaging in hacking can result in consequences such as account bans, legal action, and even criminal charges in some cases. It is important to play games within the rules set by the developers.

Where does the responsibility lie with the Data Protection Act?

The responsibility under the Data Protection Act lies with the data controller, who determines the purposes and means of processing personal data, and the data processor, who processes data on behalf of the data controller. Both are responsible for ensuring compliance with the principles and requirements of the Act.

Why it is important to have secure systems for recording and storing information?

It is important within a social work environment that information is recorded, as it may be called upon for legal reasons. All communications are confidential, and on a “need to know”, basis. Communication between colleagues is essential, so that it ensures a continuity of care for the client, and all staff are aware of the current needs of the client.

What is a good way to learn a online password?

It is not ethical or legal to learn someone else's online password without their permission. It's important to respect other people's privacy and avoid trying to access their accounts without authorization. If you are having trouble remembering your own passwords, consider using a password manager to securely store and manage them.

Protecting information is the responsibility of whom?

Protecting information is the responsibility of everyone who has access to it, from individuals to companies and governments. It requires following best practices such as using strong passwords, encryption, and regular software updates.

Who in an organization should decide where in the organizational structure the information security function should be located?

Senior leadership, in collaboration with the information security team and HR, should decide where the information security function should be located in the organizational structure. Factors such as reporting lines, strategic alignment, and resource allocation should be considered when making this decision.

Which country produces the most or the deadliest viruses and which country is most known for hackers or hacking I have to do research but i couldn't find any relevant information any?

It is difficult to pinpoint a single country that produces the most or deadliest viruses as they can originate from various countries worldwide. Similarly, attributing hacking activities to a single country is complex as hackers can operate from anywhere in the world. It's important to approach these topics with caution and avoid generalizations. For credible information, consider consulting reputable sources such as security reports or cybercrime databases.

What federal act requires all users of federal computers be trained in information systems security concerns?

The Federal Information Security Modernization Act (FISMA) requires all users of federal computers to be trained in information systems security concerns. This act outlines the requirements for federal agencies to develop, document, and implement security programs to protect their information and systems.

What is Non-repudiation in information assurance?

Non-repudiation is the inability to deny sending a message, and is usually accomplished via digital signatures or a trusted third party (TTP).

If the signature is known to belong to the sender, then we can assume that any message sent using that signature was sent with the knowledge of the sender. Therefore, the sender can not later say, "I never sent a resignation letter" when we have a digitally signed message saying otherwise. This method is common with asymmetric (public key) cryptography.

When using a TTP, the sender will send a message (signed or not) to a third party which the sender and receiver have previously agreed upon, the TTP then forwards the message to the final recipient(s). This method of transmission is generally used with symmetric (private key) cryptography. Because the TTP has received the message, they essentially act as witnesses, so the sender can not deny having sent a message.

The caveat with non-repudiation is that we assume the keys have not been compromised - but that's another discussion. The mechanics of how these forms of cryptography work can be found elsewhere on this site, or at sites dedicated to IA, cybersecurity, and cryptography.

Explain the difference between physical security threats and threats to data?

Physical threats are those which impact your body, mind, or solid goods. These would be anything from an unlocked door, to a stalker.

Threats to data relate more specifically to informaton--things you cannot directly hold in your hand. These could be anything from a untrustworthy employee in a Social Securiy office, who may steal information about you, to an unprotected computer or server with information about you, which could be hacked.

How do you manage information system?

There are different components of an information system, there are routers/firewalls, servers, PCs. The best way to manage them it to ensure they communicate with each other, and keep them up to date on patches, IOS, OS, virus defs, etc.

What are the disadvantages of manual system in election?

Manual systems in elections are prone to human error, such as miscounting or misplacing ballots, which can lead to inaccuracies in the results. They can also be time-consuming and resource-intensive due to the manual processes involved. Additionally, manual systems may be more susceptible to fraud or manipulation compared to modern electronic voting systems.

How frequent is password cracking?

The frequency of password cracking attempts can vary depending on the individual's online activity and security measures in place. Users with weak passwords or those who reuse passwords are more at risk of being targeted for password cracking. It is recommended to use strong, unique passwords and enable two-factor authentication to help protect accounts from unauthorized access.

What is the difference between hacker and criminal?

okay, i think this is the easiest way to explain this is by explaining the different kinds of hacking.

there are three kinds of hackers, there are white hat hackers, gray hat hackers, and black hat hackers.

white hats to legal things for good purpose.

gray hats do illegal things for good purpose

black hats do illegal things for bad purpose (ex: to harm someone)

for a true definition of a hacker check out the hackers manifesto.

a criminal is someone who does anything illegal

Trending Questions
What is handshake in packet transmission? What information contained in the official phreaker manual might help a security administrator to protect a communications system? How do you remove a program from the all programs menu? What should you do about remadm-pskill detected by mcafee? Disadvantages to using long passwords? What does a router do in a home peer-to-peer network? C Program Files InstallShield Installation information - Is it safe to delete it's contents and it? What are the types of cryptography? User habits that create security risks? Where can one find Kaspersky keys online? Why does this message always appear after being away for a few minutes this computer is in use and has been locked? Sammi says hello to Paul by waving Hello and waving are examples of which two parts of the communication process aencoding and channel bmessage and channel cchannel and decoding dmessage an? How do you unlock pen drive on office computer. I dont have admin rights to access pen drive. Please give me some tricks? Why is Microsoft security not working. I downloaded it about a year and a half ago and worked just fine but for the past few months it seems to not work and denies me access to it? Does installing a Windows 7 OS downloaded from torrents onto your Dell computer void your warranty with Dell? What are five physical security methods? Can you get ink poison from printer ink? Could a computer program be used to automate testing for trapdoors Explain? What does control of access to data via third party suppliers mean? Which cryptography should be use to encrypt the data for an online service provider if the liability is the number one consideration?