Friday, December 4, 2015

Chapter 12 Short Answer 

What are a CSO's responsibilities? What qualifications should a CSO have?

A CSO is responsible for the physical security of an organizations property and people and for the digital security of computing resources.

CSO's qualifications should be
  1. Strong communication skills.
  2. experience with risk management.
  3. A n understanding of security laws.
  4. Knowledge of information technology.
  5. Experience with business planning. 

Chapter 11 Short Answer

List reasons for backing up a database. List some ways to back up a database.

Backing up databases are a good idea so no data is lost in case of a failure.

Ways to back up a database are
  1. Back up program on the computer that is already running.
  2. Copy the database to another storage device. 
  3. Copy the database to a different folder.

Chapter 10 Short Answer

What is IP hijacking? Differentiate between an uplink ad a downlink. 

IP hijacking is when a cyber thief  taps into a home router or modem and uses the connection to commit illegal acts.

Uplink- Transmission from an earth-based station to a satellite.
Downlink- Transmission from an earth-based station to a satellite. 

 

Chapter 9 Shot Answer 

What are permissions? List alternatives to passwords.

A permissions is to define who can access certain resources and when they can be accessed.

Alternatives to passwords
  1. Numeric characters
  2. Swiping or touch
  3. Finger print or facial recognition

Chapter 8 Short Answer


What is the life span of a memory card? List ways to to care for a memory card.

Memory cards can last 10 to 100 years.

Ways to care for a memory card are

  1. Do not bend the card.
  2. Avoid dropping the card.
  3. Keep cards away from direct sunlight.
  4. Do not expose cards to extreme temperatures.
  5. Do not remove the card while data is transferring to or from it.

Thursday, October 22, 2015

Define printer hacking. List steps you can take to secure printers.

Printer hacking is where a person from withing in organization or outside the building can print a document without permission if the network is connected to the internet.

Steps you can take to secure your printers-

  1. Place printers in a secure room, not out in the open 
  2. If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life.
  3. encrypt documents before sending them to the printer using a secured network.
  4. restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print.
  5. Use a printer program to track and report the types of jobs, and keep a record of the users who sent them.
  6. Unplug the printer when it is not in use, or do not connect it to a network.
  7. Update the printer with the latest firmware.
What should you consider when selecting a processor? What eCycling options are available?

What should you consider when selecting a processor-

  1. Determine your needs.
  2. Determine you current processor.
  3. Research processor models.

What eCycling options are available-

  1. Wireless carriers and big box retailers often except donations or offer buy-backs.
  2. Non-for-profit organizations.
  3. Secondary market.
  4. EPA