Thursday, March 31, 2011

Wednesday's 4RQs #2 from ch.10

1.)Key terms:

  • Access control Software: a software that only allows users to access according to the user's needs

  • active badge: a microprocessor-controlled ID badges that broadcasts infrared identification codes to a network receiver

  • antivirus:a program designed to search for virus, alert the users, and destroy the virus

  • authentication mechanism: a security measure that make sures only legitimate users have access to the system by asking potential users to identify themselves

  • authorization mechanism: a security measure that guarantees that users have permission to perform a particular task

  • autonomous system: a complex system that can assume almost complete responsibility for a task without human input

  • back up:the process of saving data- especially for data recovery

  • biometric: measurements of individual body characteristics

  • computer crime: an crime accomplished though knowledge or use of computer technology

  • computer security:protecting a computer system and information from...

  • DoS attack:(denial of service) a type of computer vandalism that bombard servers and Web sites , denying service to legitimate clients and customers

  • encryption: a secret numerical code that can be used to scramble network transmission

  • firewall: a tool used to keep internal networks secure while enabling communication with the rest of the Internet

  • hacking: electronic trespassing and vandalism

  • identity theft: the crime of obtaining enough information about a person to assume his or her identity

  • logic bomb: a program designed to attack in response to a particular logical event or sequence of events

  • malware: malicious software (worms, viruses, etc.)

  • passwords: the most common security tool used to restrict access to a computer system

  • sabotage: a malicious attack on work, tools, or business

3.)Describe the typical computer criminal. How does he or she differ from the media stereotype. the typical computer criminal is a trusted employee with no criminal record who is tempted by an opportunity.Greed, financial worries ,or personal problems motivate this person to give in to temptations. This is different from the stereotypical criminal who is described as a young, bright, technically savvy,white, middle class, male who in addition to programming his computer, may break into others. The stereotype classify the criminals young, white and middle class, but that is just a generalization.



9.)Every afternoon at closing time the First Taxpayer's Bank copies all the day's accumulated transaction information from disk to tape. Why? They do this to backup their work and take precautions, data and software are backed up on to disks or tapes at the end of the day to allow them, if necessary, to go back several days weeks, or years to reconstruct files. It is also done to secure the files in case something happens.


10. In what ways can computer security protect privacy of individuals? In what ways can computer security threaten the privacy of individuals? Protect privacy: Computer security protects us from destructive viruses, illegal interlopers,crooked coworkers, software pirates, and cybervandals who can erode trust, threaten jobs and make life difficult for everyone. It also prevents our personal information from getting into the wrong hands. Threatens privacy: The complex procedures, virus protection programs, intellectual property laws and other security matter, which are used to protect our privacy , if carried to far can interfere with our work and individual human rights. Government and corporate databases gather information about us without our knowledge. In order to protect us, they invade our privacy.