answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Are cyber criminals usually security individuals?

Before the Internet, criminals had to dig through people's trash or intercept their mail to steal their personal information. Now that all of this information is available online, criminals also use the Internet to steal people's identities, hack into their accounts, trick them into revealing the information, or infect their devices with malware.

Should a hacker go to jail?

That depends on what they do while hacking and their age. Sending an 11 year old script kiddie to jail probably won't be as effective as bringing his parents into it, having his computer privileges revoked and making him do community service. On the other hand someone who writes malware and embeds it as a Trojan in software so that they can hack computers to join them to a botnet DO belong in jail - preferably with a lifer named Bubba who wants to "have some fun with them". - ok I admit, I hate spammers and people who release scareware, spyware, etc. but the harm these people do is very expensive in terms of lost time and productivity not to mention the theft of services and aggrivation they are guilty of.

What is a malicious insider?

A malicious insider is an employee or authorized person who uses his data access for harmful, unethical, or illegal activities. Because of the wider access available internally, insiders are often harder to detect and apprehend than external attackers or hackers.

What life experiences might turn a trusted user into a malicious insider?

Life experiences such as financial struggles, personal grievances, feeling undervalued or unappreciated, or exposure to criminal influences could potentially turn a trusted user into a malicious insider. These experiences may cause someone to rationalize unethical behavior or seek retribution through unauthorized actions within their organization.

What are the three phases a hacker goes through prior to attacking their victim?

Footprinting, Enumerating, Scanning.

Although - on the lighter side - anyone who has ever had their computer hacked might think that, hopefully, the three phases could be: shortness of breath,coughing, and asphxiation.

What is a authorisation password?

An authorization password is a security code or passphrase that verifies a user's identity and grants access to certain systems, applications, or accounts. It helps protect sensitive information and prevents unauthorized users from gaining entry.

What other item did Uncas also reveal?

Uncas also revealed the bracelet that Cora had given to Alice as a token of their sisterly bond.

What characterizes a DoS attack?

Many hosts participate in a coordinated attack. They send an overwhelming number of transactions to the target site, effectively blocking real traffic. In some cases, the huge volume will CRASH the site's servers.

How do you set-up ssh with dsa rsa public key authentication?

To set up SSH with DSA/RSA public key authentication, you need to generate a key pair on the client machine using a command like ssh-keygen. Then, copy the public key to the server's ~/.ssh/authorized_keys file. Finally, make sure the permissions on the ~/.ssh/ directory and the authorized_keys file are secure (e.g., chmod 700 ~/.ssh and chmod 600 ~/.ssh/authorized_keys).

Reset password for dell inspiron 1520?

reset password for dell inspiron 1520 As far as I know , the laptop bios password cannot be erased by battery discharging , which means u had to go to Dell After-Service for help .

How the limits of a particular electronic information system and the security level of users may affect the information that is accessible on that system?

The limits of an electronic information system, such as storage capacity or processing speed, can affect the amount and type of information that can be accessed on the system. If the system has limited storage, for example, it may only be able to store a limited amount of information, resulting in some data being inaccessible. Additionally, the security level of users can impact the information accessible on the system, as users with lower security permissions may be restricted from accessing certain sensitive or confidential information.

What can people do to help protect themselves from computer crimes?

People can protect themselves from computer crimes by keeping their software and operating systems up to date with the latest security patches, using strong and unique passwords for all of their online accounts, being cautious of suspicious emails and links, and using reputable antivirus and anti-malware software. Additionally, it is important to regularly back up important files and data, and to avoid using public Wi-Fi networks for sensitive activities.

How do you change your password on your email account?

you go to your profile page and look up your account info and scrool down were your password is at .there should be a link that says change password .click the link and delate your password and put in a new password

Can people hack into your computer through minecraft?

Almost certainly not. It uses a protocol simple enough for it to not have any vulnerabilities, and even if there would be a security hole, you're safe in singleplayer.

Concepts of hacking and cracking?

Long answer made short: * learn what asm is (short for assembly code) * learn how to reverse engineer (get the assembly code of a program, a debugger is most commonly used) * learn a programming language basics (mainly how to read and write to memory) You can then reverse your program, find what you need to change, and create an external program to edit the part you wish to change. (otherwise known as memory hacking, or mem hacks) to crack, its the same, reverse, locate, however, you then have to permantly change part of the program. this is often done to bypass serial codes. a JE is changed to JNZ, or simply JMP.

Definition of decryption?

decryption is the process of extracting the original information from the encrypted data.

Sample data flow diagram for super market system?

These can be found online. You might want to do an image search for the industry or business that you want this information for.

How does asymmetric encryption provide confidentiality?

Asymmetric encryption can provide confidentiality in two ways:

1) messages encrypted using the public key of the recipient can only be decrypted using the private key of the recipient - which only the recipient should possess.

2) It can be used as part of a negotiation process between two users to establish a temporary shared key through a process such as the following:

  • User A sends a challenge message to user B which is encrypted with user B's public key to initiate secure communications.
  • User B decrypts the message and sends the correct response back to user A encrypted with user A's public key
  • The two users are now authenticated to each other
  • At this point A can send a proposed symmetric key to B encrypted with B's private key
  • All further communications are encrypted via the shared symmetric key

In this second scenario, the asymmetric encryption only facilitates the establishment of confidentiality via the eventually shared symmetric key by securing the initial negotiations.

What are some security measures for home computers?

Physical security measures are those which are taken to protect assets from physical theft, loss, or damage, and is not limited to computers - the concepts can be applied in any setting where security is desired. A locked door is the simplest form of physical security control, and can be layered with CCTV, explosion prevention, spikes/barbed wire on walls and rooftops, card swipes, biometric scanners, moats, vault doors, or other types of intrusion prevention systems. Automated machine gun defenses are even in place at highly secured facilities.

On a basic level, securing workstations can be accomplished through the use of cable locks, security pads affixed to furniture, and even security personnel.

How do you set up a network firewall?

You can setup your network firewall with your accessing router. consider you are using the Belkin Router : than follow these steps :

Access the Belkin router setup utility via the web browser. For doing that, browse the Internet and enter the '192.168.2.1' in the browser's address bar. Click 'Enter' to continue. On the login web page, type your router password and click the 'Submit.'

On the setup page, click the 'LAN Setup' menu in the left corner window. Now, you can see the current configuration of the firewall of the router. In Features section, check that the firewall is turned on or not.

Once you assure that the firewall is not enabled, click the 'Firewall' menu to display the firewall settings on the screen. Click the 'Enable' button to select it and then 'Apply Changes' to save your settings.

That's all process allow you to enjoy setup the firewall on the Belkin router and the safety and protection when online or offline.

What is a password hint?

A good password hint is something that would confuse other people when they read it, but when you read it, you immediately know what it means and what your password is. That way, people can't guess your password but then you know what it is after you read your hint.

What is the full meaning of CCNA?

CCNA is the acronym for the Cisco Certified Network Associate certification from Cisco.CCNA certification is a second-level Cisco Career certification . CCNA certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN

Does shrink wrapped software from major need to be scanned for infections?

If the install disk is still wrapped from a major software provider, then no, you shouldn't need to. Doing so would not harm anything, but you shouldn't need to scan something like an install disk for Microsoft Office. Even if a CD or DVD is not wrapped, but you know it came from a reputable source, like Adobe, you should not need to scan it.