answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

Which is an appropriate way to handle removable media and the information stored in it Encrypt only sensitive and unclassified information not cleared for public release True or False?

The requirement is to at LEAST encrypt all sensitive and unclassified information not cleared for public release that is stored on removable and mobile computing devices. That may very well mean that the entire media must be encrypted, but there are acceptable solutions that only a portion of the storage media - as an encrypted file or encrypted partition. It is important to select a truly effective encryption solution however. If the keys to decrypt the information are stored on the same device, it isn't going to provide much protection. Likewise, if it is easy to break the encryption it isn't going to help much. If temporary files store the information in unencrypted form, then again it isn't really protected. Once encrypted, the decryption key(s) need to be protected and maintained such that an authorized user can still access the data. If you lose the key and have no backup, you have just caused a self-initiated Denial-of-Service.

What are the different types of security?

  1. Large-company common stocks.
  2. Small-company common stocks (small caps).
  3. Corporate bonds (Long-term).
  4. Government bonds (Long-term).
  5. Immediate-term government bonds.
  6. Treasury bills (T-bills) / Short-term government bonds.

What is an example of system software and benefits of system software?

You can't do anything without system software. To run every application software, the computer has to have the coding as to how it could understand the language the application software is speaking and how could it emulate them into instructions it could perform - are the necessities of system software.

Prominent examples of system software are Mac OS, Linux, MS-DOS, Windows etc.

What steps could you take to help secure a computer against internet attacks for a small LAN with 12 computers connected via a hub?

  • The first step would be to install and maintain a good anti-virus, anti-spyware, and anti-adware software on your computer.
  • You should also enable the built-in firewall that probably comes with the operating system installed on each computer.
  • If the hub is a "dumb" hub, you probably can't do much with that, but if it is a "smart" hub, you can also configure it to provide some firewalling and traffic filtering capabilities. Refer to the manual for the hub to find out what, if any capabilities it might have.
  • If possible, install a firewall and/or proxy server between the LAN and the internet to protect all the computers on the LAN. Turn off the computers when they are not in use.
  • Use usernames and passwords on all the computers
  • If the operating system has the capability to have accounts with different permission levels - like "administrator" and "limited user" create limited accounts on the computers and always operate the computers under a limited account except when absolutely necessary to perform functions that require administrator level access - and then log off the administrator account as soon as you are done
  • Enable pop-up blocking on the browser(s)
  • Set the privacy/security settings on the browser(s) to the most restrictive level that is consistent with operational needs
  • Create an "acceptable use policy" document that spells out what is and is not acceptable use of the computer resources on the LAN and consequences of misuse, then have everyone who is authorized to use the computers on the LAN read the policy and sign an agreement stating that they have read the policy and agree to abide by it.
  • Train all users in best practices for computer security in personal computer use
  • Teach all users to recognize and avoid phishing and other social engineering attacks
  • Require users to change their passwords at least every 6 months - every 3 months or more often if you want to add to relative security
  • Keep all system patches up-to-date including both operating system patches and application patches
  • Only download patches from trusted sites - for example - only get Microsoft patches from the Microsoft site, not a 3rd party site.

An appropriate way to handle removable media and the information stored on?

Encrypt only Sensitive and Unclassified Information Not Cleared for Public Release

What is the best video accelerator?

Bywifi video accelerator is the best one because I have personally tried others like speedbit and it was nowhere near the speeds of bywifi.

What is ISV?

Indipendent Software Vendor

How can you block Vista Home Security 2011 from your computer?

Vista Home Security 2011 is a fake. You can do a system restore or remove the fake program. If you plan to remove Vista Home Security 2011 rather than using System Restore, see Related Links for a guides which may help.

Vista Home Security 2011 will start every time any program is run. Therefore, you will need to remove it properly. You can also use programs such as Malwarebytes to remove it.

A software package that contains two or more software programs made by the same company is called?

good

A suite or package, Some software tools perform only one task and are limited. Software packages are a mix of tools and come together as a system. For example, MentorsoftPRO, it has statistical analysis tools for plotting diagrams, charts and scientific experiments, it has training videos that apply to Lean Six Sigma methodology, and it has a project tracking management system, which all together make a package. Any one of these can be separated as a tool. Look at this at http://www.dbar-innovations.com to get a better understanding.

Would anything crazy or dangerous happen to your computer if you pause the Adblock computer program?

Nope - It's just a program that restricts most adverts form showing on your screen. Pausing it will not harm your computer (but may allow ads to be shown). I've used Adblock for a number of years without incident.

Is there any software like comiclife?

Try JourneyMaker.

JourneyMaker can create comics, card, adventure type games:

Allow you to create interactive stories, comics, cards, choose-your-own-adventure type games with zero programming.

Include MP3 sounds and can be deployed as either "Web Folders" or Mac Applications which can be served over the internet (if you have a web host provider).

You can find it at http://www.brothersoft.com/journeymaker-204569.HTML

GHOUL

Two software applications that interact with each other?

Many applications interact with each other. For example, your operating system interacts with a regular program to get information one it. Also, your anti virus searches your computer for viruses, and will interact with other programs to extract information from them to see if their safe to use. There are so many examples to use, but mainly every program interacts with your operating system in one way or another.

What is unauthorised modification?

Unauthorised modification is changing the contents of a file without the granted permission

Why are the people tricked into exposing themselves to computer security threats?

I can help you answer your homework question on computer security. Here, I've written a great summary in this attached file. Just double click to open it....

Is mywebface safe?

It is not safe. it's full of spyware.

Can someone hack into your computer using Teamviewer?

No sir, if you have it running in the back ground than maybe, but i doubt they will get your password, it regenerates every time you restart your TV and if they get it wrong i believe you get a warning so you can generate a new one or shut it down fast :Pso yeahh NO :D

What software is easybib.com?

easybib.com is a MLA, APA bibliography generator.

A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.

What does Asura software do?

Hi all, The ASURA software is a Distributed shared memory multiprocessor. It is a large scale, cluster-based, distributed, shared memory, multiprocesor being developed at Kyoto university and Kuboto corporation. Up to 128 clusters are interconnected to form an ASURA system of up to 1024 processors. The basic concept of the ASURA design is to take advantage of the hierarchical structure of the system. Implementing this concept, a large shared cache is placed between each cluster and the inter-cluster network. The shared cache and the shared memories distributed among the clusters form part of ASURA's hierarchical memory architecture, providing various unique features to ASURA

Which of the following is a major security concern for mobile devices?

Device and data theft

Answer Explanation: Compared to other network equipment, a major security liability of mobile devices is theft or loss of the device and of its data. To minimize the impact of a lost or stolen device, you should transfer its data to a network location often. You should also implement secure passwords on the device, which will make unauthorized access a little more difficult. Another recommendation for mobile devices is to encrypt the information stored on a mobile device.

What is the appropriate way to handle and dispose of contaminated sharps?

Handle them very carefully. They need to be placed in a sharps container and taken to a disposal facility. Some hospitals offer this service.

How do you block adultfriendfinder site?

Go to tools up at the top left of your browser then click options then go to security and block all the sites you want.