Wednesday, August 10, 2011

"sometimes its not enough
that a lesson is explained to you,
sometimes you have to go through the
experience and make a mistake
before you learn what life is trying to
teach you.."

Comped321L Quiz 9


1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities.

Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism

2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

Computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
Worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
Trojan horse is a program that hides within or looks like a legitimate program.
Root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. 


3. Discuss techniques to prevent unauthorized computer access and use.

     Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or illegal activities. Organizations can take measures such as implementing a written acceptable use policy (AUP), a firewall, intrusion detection software, an access control, and an audit trail. Access controls include a user name and password or passphrase, a CAPTCHA, a possessed object, and a biometric device.

4. Identify safeguards against hardware theft and vandalism.

     Hardware theft is the act of stealing computer equipment.

     Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment.

5. Explain the ways software manufacturers protect against software piracy.

     Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.
6. Discuss how encryption works, and explain why it is necessary.

     Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.
7. Discuss the types of devices available that protect computers from
system failure.

     A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
8. Explain the options available for backing up computer resources.

     A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup.

9. Identify risks and safeguards associated with wireless communications. 

    
 Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring a

10. Discuss ways to prevent health-related disorders and injuries due to
computer use. 

     A
 computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing. 

     Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for
 information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. 
    
 Green computing reduces the electricity and environmental waste while using a computer

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following.
Electronic profile combines data about an individual's Web use with data from public sources, which then is sold.
Cookie is a file that a Web server stores on a computer to collect data about the user.
Spyware is a program placed on a computer that secretly collects information about the user.
 Adware is a program that displays an online advertisement in a banner or pop-up window.
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
Phishing is a scam in which a perpetrator attempts to obtain personal or financial information.
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Employee monitoring uses computers to observe, record, and review an employee's computer use.
Content filtering restricts access to certain materials on the Web.

Tuesday, August 9, 2011

Comped321L Quiz 8


1. Define the term, database, and explain how a database interacts with data
and information.
A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images.
 Data refers to qualitative or quantitative attributes of a variable or set of variables.
Information in its most restricted technical sense is an ordered sequence of symbols that record or transmit a message. 

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.
File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed.
Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct.
Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.

3. Discuss the terms character, field, record, and file.
Character is a unit of information that roughly corresponds to agrapheme, grapheme-like unit, or symbol, such as in an alphabet or syllabary in the written form of a natural language.
 Field is a combination of one or more related characters
 Record is a group of related fields
 File is a collection of related records


4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.
   
Data dictionary contains data about each file in a database and each field within      the files.
 Backup - is the copy of the database.A log is a listing of activities that change the contents of the database. 
 Recovery Utility - uses the logs and/or backups to restore the database.

5. Differentiate between a file processing approach and the database
approach.
A database coordinates the physical and logical access to the data; a file-processing system only coordinates physical access to the data
 
6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
relational database stores data in tables that consist of rows and columns
Object-oriented databases often use Object Query Language (OQL) to manipulate and retrieve data.   
 A multidimensional database can store data in more than two dimensions of data

7. Explain how to access Web databases.
To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist
Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 
Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software.
Corporate Spy - have excellent computer and networking skills and are hired to   break into a specific computer and steal its proprietary data and information.
Unethical employee - break into their employers' computer for a variety of reasons.   Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.

9. Identify database design guidelines and discuss the responsibilities ofdatabase analysts and administrators.
Database Analysts and Database Administrators are responsible for managing and    coordinating all database activities. 
Database Analysts (DA) - focuses on the meaning and usage of data. The DA decides on the placement of fields, defines the relationships among data, and identifies user's access privilege.Database Administrators (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages
 data security, monitors database performance, and checks backup and recovery procedures.  

10. Discuss techniques to prevent unauthorized computer access and use.
Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program.









Comped321L Quiz 8


1. Define the term, database, and explain how a database interacts with data
and information.
A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images.
 Data refers to qualitative or quantitative attributes of a variable or set of variables.
Information in its most restricted technical sense is an ordered sequence of symbols that record or transmit a message. 

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.
File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed.
Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct.
Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.

3. Discuss the terms character, field, record, and file.
Character is a unit of information that roughly corresponds to agrapheme, grapheme-like unit, or symbol, such as in an alphabet or syllabary in the written form of a natural language.
 Field is a combination of one or more related characters
 Record is a group of related fields
 File is a collection of related records


4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.
   
Data dictionary contains data about each file in a database and each field within      the files.
 Backup - is the copy of the database.A log is a listing of activities that change the contents of the database. 
 Recovery Utility - uses the logs and/or backups to restore the database.

5. Differentiate between a file processing approach and the database
approach.
A database coordinates the physical and logical access to the data; a file-processing system only coordinates physical access to the data
 
6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
relational database stores data in tables that consist of rows and columns
Object-oriented databases often use Object Query Language (OQL) to manipulate and retrieve data.   
 A multidimensional database can store data in more than two dimensions of data

7. Explain how to access Web databases.
To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 
Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software.
Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
Unethical employee - break into their employers' computer for a variety of reasons.   Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.

9. Identify database design guidelines and discuss the responsibilities of database analysts and administrators.
Database Analysts and Database Administrators are responsible for managing and    coordinating all database activities. 
Database Analysts (DA) - focuses on the meaning and usage of data. The DA decides on the placement of fields, defines the relationships among data, and identifies user's access privilege.
Database Administrators (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages data security, monitors database performance, and checks backup and recovery procedures.  

10. Discuss techniques to prevent unauthorized computer access and use.

Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program.