Saturday, April 9, 2011

Chapter 10: Computer Security and Risks RQs

2. Why is it hard to estimate the extent of computer crime?

This is because much computer crime is undetected and some of those that are detected are not reported to the authorities for fear of embarrassment and a result of even more of a loss due to negative publicity.

3. Describe the typical computer criminal. How does he or she differ from the media stereotype?

The typical computer criminal is a trusted employee with no criminal record who is tempted by opportunity, greed, and financial problems. The typical computer criminal can be clerks, cashiers, programmers, computers operators, and managers. While these might be different to the media stereotype such as former employees seeking to get revenge om their former bosses, high-tech pranksters looking for a challenge, spies looking for classified info, and etc...

4. What is the most common computer crime? Who commits it? What is being done to stop it?

Theft is the most common computer crime. It is committed by spoofers, identity thieves, and usually anyone who wants to steal money, goods, info, and computer resources. To stop it computer users are now using helpful tips to protect themselves against theft such as making all online purchases using a credit card, checking for secure, reliable websites, not disclosing personal info over the phone, handling email with caution......


6. Describe several different types of programs that can be used for software sabotage.


Viruses- software that spreads from program to program or disk to disk, and uses each infected program or disk to make copies of itself. Some viruses reproduce, display images on computer's screen, destroy data, or erase disks.
Worms- uses computer hosts to reproduce themselves. They travel interdependently over computer networks, seeking out uninfected workstations to occupy.
Trojan Horses- it performs a useful task while at the same time carrying out some secret destructive act.


7. What are the two inherent characteristics of computers that make security so difficult?


1. A computer does exactly what it is programmed to do, including reveal sensitive information. Any system that can be programmed can be reprogrammed by anyone with sufficient knowledge.
2. Any computer can do only what it is programmed to do


8. Describe several different computer security techniques, and explain the purpose of each.

Biometrics- something about you, like a voice print, fingerprint, retinal scan, facial feature scan, or other measurements of individual body characteristics. This is used to identify a person attempting to access computer equipment because the person attempting to gain access might have the authority to do so, so if the biometric is not matched with that of authorized personnel then that person will not gain access.
Passwords- these are the most common security tools used to restrict access to computer systems.
Access-control software- software that only allows user according to the user's needs. Some users can only open files that are related to their own work. Some users are allowed read-only access to files they can see but not change.


10. In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals?

It protects us through passwords so that confidential information that we wish not to be shared with others will not get into the hands of identify thieves and hackers. This is also done through firewalls, biometrics, encryptions, and audits. Some ways in which security threatens privacy is when security systems track every move of an individual, even a minute by minute report on that individual. For instance, the use of an active badge which identifies an authorized or unauthorized person, find that person through computer screen just like security cameras, and remember every single place and instance that individual was at and was doing.


11. What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?

Smart weapons are missiles that use computerized guidance systems to locate their targets. They differ in that they lessen the use of human capability in tracking targets. The advantages are that they can greatly reduce the amount of civilian destruction in ear is everything is working properly. While the risks are that they reduce the amount of time people have to make life-and-death decisions. As the decision-making time goes down, the chances of making mistakes goes up. Another is software reliability so that if a bug were to penetrate a system it could multiply within no time. One error could cause a big disaster.



1 comment: