answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How salami attack work?

Salami attack- This financial crime works by taking small amounts of money over an extended period. For the attacker to be successful, he must remove an amount so small that it will go unnoticed.

What is security of files?

Security normally refers to Confidentiality, Integrity and Availability.

Briefly, your files must be:

  • accessible: only to the persons and applications you authorize, and with the minimum privilege required (if a user has only the need to read a file, he/she MUST NOT have the right to modify or delete it);
  • modifiable: only by users or applications authorized to do so;
  • available: when the authorized users need to access them: a file is useless if it not available when you need it.

Additionally, there are a couple of additional related aspects that are:

  • authenticity: the files must be attributable without doubts to the creator;
  • non-repudiation: the creator of the file must not be able to disavow the files he/she has created.

What should you do if you have forgotten your password?

  • You click on the "forgot my password" section, fill it in and the new password will appear in your hotmail inbox.
  • You forgot to tell us what password. Is it windows password? If you forgot that,you can try some reset password tools, just like "Windows Password Recovery 6.0" I used last week.
  • If you have a password reset disk you can easily reset your lost password with it, Windows Password Breaker can help you create such a password reset bootable CD/DVD or USB flash drive. No need to reinstall your system.

How effective is a firewall?

A strong and upgraded firewall protection acts as a virtual barrier that defends external and internal damages from cyber attacks. Installing a powerful firewall protection on your system or network, provides you low-level protection against malware, identity theft or other cyber attacks along with the login and auditing procedures.

There are several forms of firewall, each having their own specific functions to perform. Broadly, firewalls are of two types- host-based and network based. A host-based firewall protection is installed on the user's computer or server to monitor the incoming and outgoing signals. On the other hand, a network-based firewall is installed over a network or cloud's infrastructure to control and protect the data being transmitted from one host to another on a network. A network-based firewall is also referred as a virtual firewall service.

How is computer information protected?

It heavily depends on software installed on them.

For example, computers with Windows installed aren't very secure, unless they have a firewall and antivirus installed.

Linux is secure, unless somebody configures it to not be secure.

BSD is security-oriented, so it's very secure.

As for hardware - not very much, since one can take out a hard disk and read it elsewhere, boot a LiveCD/DVD and crack local password, etc.

The security risks involved in allowing cookies to be stored on your computer?

Thankfully any sort of malicious cookie can and will be detected by your Antimalware or Antivirus software - it's generally one of the first areas that are checked! Cookies are just small bits of information used by websites to enhance your browsing experience and it is often considered a very small risk. It should also be noted that there are browser options to ensure that you don't receive tracking cookies if you are very privacy-focused.

How you can protect your computer from unauthorized access?

There are plenty of ways to prevent authorized access. Your first line of security is your computer password - this prevents physical intrusion at a basic level. Your second line of defense are the two brothers: Antivirus and Antimalware; often times AntiVirus programs are bundled with AntiMalware, ultimately that choice is up to you if you want to use a dedicated Antimalware program. These two programs defend and seek out intrusions via complex algorithms and comparing known attacks and symptoms by constantly monitoring your PC. While lots of AntiVirus programs offer a web-defense (defends you from shady websites) it's always good to consult your browsers' settings and enable any sort of Web Protection they offer; Chrome and Mozilla both maintain an initiative which collects user submitted info on reported websites and notifies you when you try to access one. These notifications may appear long before your AntiVirus picks them up.

If you wanted to take a step further in being actively protected, there are Keystroke Scrambler programs which scramble your keystrokes when typing - this prevents any program, such as a keylogger, from recording what you are actually typing. The scrambling software employs special algorithms which keystrokes appear normal for the user, but not for malicious software.

Lastly, the most important line of defense is common sense! Remember to remain aware of the dangers of clicking suspicious links, visiting websites you are unsure about, and downloading programs.

What is the difference between passive IDS and active IDS?

When you are using active scanning you have to send certain signal through network. This kind of attack the easiest to find, but the fastest to get information about a remote computer.

When you are using passive scanning, you are collecting information which are going through network without sending any request to a remote computer. This sort of attack really hard to find, but it's possible using special kinds of network packets. It requires more time then for the active mode.

Does firewall block viruses?

Firewall don't stop viruses it just keep ypu computer safe...

I mean when you run program, firewall will ask you if you let this program to run or not...

When virus try to run program secretly when you will not notice the program, but firewalll will tell you that some kind of program is runned, so you may block it and that will stp the virus.

only the antivirus software on stops the viruses.

How the use of computer networks can improve communication for the individual?

My caterpillar kidnapped the man who had murdered Mr. Carrot who (believe it or not) was going to be the caterpillars tea so the caterpillar cried so much that his tears drowned the monkey so the gorilla squashed the caterpillar.

P.S. I'm flying evil rainbow firebreathing pineapples

What are disadvantages of using a star topology?

If the server dies, the computers get unseen for each other. It isn't a good idea in every situation to leave the whole network to only 1 computer, because if it ets an error, your network is dead.

Hacking is it a crime?

That depends on what you hacked and what way you hacked it. Did you know it's actually illegal to add/remove a user account on a computer that's not yours, if you on a limited account. In a court of law, this is considered hacking.

In Ireland there was a case a while back in which a person ended up in court for the above reason being tried as a computer hacker.

Yet about 3 months later somebody happened to stumble upon a flaw in a prominent politicions website, he published his findings, got caught, and was told "he was nothing more than a router with too much time on his hands who got lucky" and this particular man had studied IT in one of the best colleges in the country.

How do you protect against a power surge?

The easiest way is to use an UPS. It's a device that provides voltage during a limited period of time. If you are more than a real company their are other solutions like a generated but keep in mind that this cost you a lot of $.

In a multiprogramming and time-sharing environment several users share the system simultaneously This situation can result in various security problems?

Two possible security problems could be: copying another user's data; using system resources (CPU, memory, disk space) without proper accounting.

How does data encryption help keep data secure?

When data is stored or sent, it can be sent as it is, when over a network this would be packets.

But when data is encrypted, its simply like saying, if i sent you an email that says

Hi, How are you

H = 103343

i = 408300

, = 985742

The numbers are sent not the letters so the computer on the other end, Decrypts this data for your display.

How many people hack?

Well, Many people consider hackers to be crazy people who really try and spend all their time "hacking" people, but really hacking isn't as easy as many people think it is, this question is hard to answer but it would actually be a lot less than many would think.

How do to recover stored password in computer?

Method one: Log into an alternate account

Often many users will leave the administrator account alone and/or have other accounts with administrator rights. If you're not logging into the computer as administrator or have other accounts follow the below steps to reset your other accounts password.

1 Reboot the computer into Safe Mode. Additional information about getting into Safe

2 When logging into Safe Mode you should be prompted with an option to what account you wish to use. Select the Administrator account. If prompted for a password try simply pressing Enter on the keyboard for no password. If this does not work, try other passwords you may have used. If you're unable to log into the Administrator account skip to the next suggestion.

3 Once you've logged into the Administrator account open Control Panel and User Accounts.

4 In User Accounts select the account you wish to change the password for, click change password and then enter the new password or click remove the password to remove the password from the account.

Method Two: Using the forgotten password diskette

If you have forgotten your Windows XP password, however have created a forgotten password diskette earlier to use the diskette follow the below steps.

1 At the Windows XP login prompt when the password is entered incorrectly click the reset button in the login failed window.

2 Insert the password reset diskette into the computer and click Next.

3 If the correct diskette Windows XP will open a window prompting for the new password you wish to use.

Method Three: LOGON.SCR password reset trick

LOGON.SCR changing administrator or domain admin password hack works on Windows NT 4.0 and some versions of Windows 2000. The simple trick uses Cmd.exe as screen saver that triggered by system when idle, allowing users to access to command prompt to change password.

Method Four: Use a third party software that is designed to recover a password automatically. The programs that are used for password recovery can be free or one you purchase.

What is piggybacking in computer security?

ACK for the last received packet need not be sent as a new packet, but gets a free ride on the next outgoing data frame(using ACK field in the frame header). The technique is temporarily delaying outgoing ACKs, so that they can be hooked on the next outgoing data frame is called piggybacking. Piggybacking is one of the feature of TCP

How do you bypass the password on a personal computer?

Do you have a password hint or a password reset disk to make the process easy?

If you don't, you will need to try and crack the password. Check the related links for some tools to help you.

Disadvantage with layered approach to protocol?

The processing and data overhead. There is processing overhaed because there are many as seven layers or modules invoked to move data from the application through the communications software. There is data overhead because of the appending of multiple headers of the data. Another disadvantage is that there must be at least one protocol standard per layer.

What does a cyber security employee do?

Cyber Security Engineers help businesses by protecting their computer and networking systems from potential hackers and cyber-attacks. They safeguard sensitive data of a business from hackers and cyber-criminals who often create new ways to infiltrate sensitive databases.

What is an example of a software suite?

go to this website:

http://www.jhigh.co.uk/ComputingSG/GPPs/IntegratedPkgs/IntegratedPkgs_Exmple.html

Can a WiFi connection be accessed without configuring a wireless modem?

Yes, it can. Usually default settings include configured DHCP server, no security, no mac filtering, broadcast SSID is on. In another words, it's configured in a way it's very easy to establish connection with it.

Why should measures of capacity matter to computer users?

I m also looking for its answer. i m doing MBA and this question is in Using Information Technology Edition 7. Chapter 4.