Thursday, October 22, 2015

Define printer hacking. List steps you can take to secure printers.

Printer hacking is where a person from withing in organization or outside the building can print a document without permission if the network is connected to the internet.

Steps you can take to secure your printers-

  1. Place printers in a secure room, not out in the open 
  2. If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life.
  3. encrypt documents before sending them to the printer using a secured network.
  4. restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print.
  5. Use a printer program to track and report the types of jobs, and keep a record of the users who sent them.
  6. Unplug the printer when it is not in use, or do not connect it to a network.
  7. Update the printer with the latest firmware.
What should you consider when selecting a processor? What eCycling options are available?

What should you consider when selecting a processor-

  1. Determine your needs.
  2. Determine you current processor.
  3. Research processor models.

What eCycling options are available-

  1. Wireless carriers and big box retailers often except donations or offer buy-backs.
  2. Non-for-profit organizations.
  3. Secondary market.
  4. EPA 
What is cyberwarfare? Differentiate among the various categories of cyber criminals.

Cyberwarfare describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

Types of cyber criminals-

  1. Hacker- A person that accesses a computer or network illegally.
  2. Cracker- A person that accesses a computer or network illegally but has the intent to destroy data.
  3. Script kiddie- Has the intent to of a cracker but does not have the technical skills.
  4. Cyber Extortionist- Someone who demands payment to stop an attack on an organization's technology infrastructure.
  5. Cyber Terrorists- Someone who uses the Internet or network to destroy or damage computers for political reasons.
What is the clipboard? List some uses of the clipboard.

The Clipboard is a temporary storage lactation.

A good use for clipboard is when you would like to take a portion of a document, and insert it into another document.
Describe the different types of desktops. What should you consider when purchasing a desktop.

Different types of desktops- Tower computers, and All-in-one Desktops.

What you should consider when buying a new desktop computer-

  1. Determine the specific software to use on the desktop.
  2. Know the system requirements of the operating system.
  3. Look for bundled software.
  4. Avoid purchasing the least powerful desktop.
  5. Consider upgrades to the computers peripherals. 
  6. Consider a touch screen monitor.
  7. Evaluate all-in-one desktops.
  8. Make sure to have multiple options.
  9. Be aware of hidden costs.
  10. Consider purchasing an extended warranty or service plan.
Describe the different types of websites. List some tips you can follow to protect yourself from privacy and security risks when using online social networks.

Some different types of websites are- search engines; online social networks; informational; media sharing and bookmarking; news, weather; sports.

Social network privacy and security risk tips-

  1. Choose friends carefully.
  2. Limit friends.
  3. Prohibit email address book scans.
  4. Divulge only relevant information.
  5. Be leery of urgent requests for help.
  6. Read the privacy policy.
  7. Manage your profile.
What is Green computing? Green computing involves reducing the electricity consumed and environmental waste generated when using a computer.

Steps you can take to contribute to green computing-

  1. Do not leave a computer or device running overnight.
  2. Turn off your monitor, printer, and other devices wen you you are not using them.
  3. Use energy efficient hardware.
  4. Use paperless methods to communicate.
  5. Recycle paper and buy recycled paper.
  6. Recycle toner, computers, mobile devices, printers, and other devices.
  7. Telecommute.
  8. Use videoconferencing and VoIP for meetings.