Friday, December 4, 2015

Chapter 12 Short Answer 

What are a CSO's responsibilities? What qualifications should a CSO have?

A CSO is responsible for the physical security of an organizations property and people and for the digital security of computing resources.

CSO's qualifications should be
  1. Strong communication skills.
  2. experience with risk management.
  3. A n understanding of security laws.
  4. Knowledge of information technology.
  5. Experience with business planning. 

Chapter 11 Short Answer

List reasons for backing up a database. List some ways to back up a database.

Backing up databases are a good idea so no data is lost in case of a failure.

Ways to back up a database are
  1. Back up program on the computer that is already running.
  2. Copy the database to another storage device. 
  3. Copy the database to a different folder.

Chapter 10 Short Answer

What is IP hijacking? Differentiate between an uplink ad a downlink. 

IP hijacking is when a cyber thief  taps into a home router or modem and uses the connection to commit illegal acts.

Uplink- Transmission from an earth-based station to a satellite.
Downlink- Transmission from an earth-based station to a satellite. 

 

Chapter 9 Shot Answer 

What are permissions? List alternatives to passwords.

A permissions is to define who can access certain resources and when they can be accessed.

Alternatives to passwords
  1. Numeric characters
  2. Swiping or touch
  3. Finger print or facial recognition

Chapter 8 Short Answer


What is the life span of a memory card? List ways to to care for a memory card.

Memory cards can last 10 to 100 years.

Ways to care for a memory card are

  1. Do not bend the card.
  2. Avoid dropping the card.
  3. Keep cards away from direct sunlight.
  4. Do not expose cards to extreme temperatures.
  5. Do not remove the card while data is transferring to or from it.

Thursday, October 22, 2015

Define printer hacking. List steps you can take to secure printers.

Printer hacking is where a person from withing in organization or outside the building can print a document without permission if the network is connected to the internet.

Steps you can take to secure your printers-

  1. Place printers in a secure room, not out in the open 
  2. If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life.
  3. encrypt documents before sending them to the printer using a secured network.
  4. restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print.
  5. Use a printer program to track and report the types of jobs, and keep a record of the users who sent them.
  6. Unplug the printer when it is not in use, or do not connect it to a network.
  7. Update the printer with the latest firmware.
What should you consider when selecting a processor? What eCycling options are available?

What should you consider when selecting a processor-

  1. Determine your needs.
  2. Determine you current processor.
  3. Research processor models.

What eCycling options are available-

  1. Wireless carriers and big box retailers often except donations or offer buy-backs.
  2. Non-for-profit organizations.
  3. Secondary market.
  4. EPA 
What is cyberwarfare? Differentiate among the various categories of cyber criminals.

Cyberwarfare describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

Types of cyber criminals-

  1. Hacker- A person that accesses a computer or network illegally.
  2. Cracker- A person that accesses a computer or network illegally but has the intent to destroy data.
  3. Script kiddie- Has the intent to of a cracker but does not have the technical skills.
  4. Cyber Extortionist- Someone who demands payment to stop an attack on an organization's technology infrastructure.
  5. Cyber Terrorists- Someone who uses the Internet or network to destroy or damage computers for political reasons.
What is the clipboard? List some uses of the clipboard.

The Clipboard is a temporary storage lactation.

A good use for clipboard is when you would like to take a portion of a document, and insert it into another document.
Describe the different types of desktops. What should you consider when purchasing a desktop.

Different types of desktops- Tower computers, and All-in-one Desktops.

What you should consider when buying a new desktop computer-

  1. Determine the specific software to use on the desktop.
  2. Know the system requirements of the operating system.
  3. Look for bundled software.
  4. Avoid purchasing the least powerful desktop.
  5. Consider upgrades to the computers peripherals. 
  6. Consider a touch screen monitor.
  7. Evaluate all-in-one desktops.
  8. Make sure to have multiple options.
  9. Be aware of hidden costs.
  10. Consider purchasing an extended warranty or service plan.
Describe the different types of websites. List some tips you can follow to protect yourself from privacy and security risks when using online social networks.

Some different types of websites are- search engines; online social networks; informational; media sharing and bookmarking; news, weather; sports.

Social network privacy and security risk tips-

  1. Choose friends carefully.
  2. Limit friends.
  3. Prohibit email address book scans.
  4. Divulge only relevant information.
  5. Be leery of urgent requests for help.
  6. Read the privacy policy.
  7. Manage your profile.
What is Green computing? Green computing involves reducing the electricity consumed and environmental waste generated when using a computer.

Steps you can take to contribute to green computing-

  1. Do not leave a computer or device running overnight.
  2. Turn off your monitor, printer, and other devices wen you you are not using them.
  3. Use energy efficient hardware.
  4. Use paperless methods to communicate.
  5. Recycle paper and buy recycled paper.
  6. Recycle toner, computers, mobile devices, printers, and other devices.
  7. Telecommute.
  8. Use videoconferencing and VoIP for meetings.