About Me
- honey grace " cUtie pAo "
- PAO is the most popular 12080.th name in USA (... 12078.indulal , 12079.mafalda , 12080.pao , 12081.karoline , 12082.arwa ...). One in every 175,551 Americans are named as PAO and popularity of name PAO is 5.7 people per million. If we compare the popularity statistics of PAO to USA's population statistics, we can estimate that as of November.21.2010 02:46 there are 1,770 people named as PAO in the United States and the number of PAO's are increasing by 15 people every year.
Monday, December 6, 2010
IT104asSiGnMeNt #2
Discussion:
Long term readers of this blog will know that I am keen on personal security from the computer perspective and also that I am keen on windows users installing personal firewalls. My friends will tell you how often my eyes roll when they ask me to fix their unprotected machines.
First I guess, a definition of personal is required here. By this I simply mean it is a software based firewall that sits on the same machine it is intending to protect. So I’m not talking standalone stuff like Smoothwall or Firestarter (both *nix based and free) and neither am I talking about the big boys of Corporate security such as Checkpoint, Cisco PIXes, Cyberguards, well the list does go on.
I hear often and long about all you need is a router and an anti-virus application (maybe an anti-malware scanner) but you should never need more than Windows provides and certainly you shouldn’t need a firewall beyond stealthing your open internet ports. Well I disagree and I will continue to do so whilst Windows maintains its inherently buggy approach to security. Beyond this I hear the so called experts say that so long as we are careful never to install or click on anything untoward then we don’t need a personal firewall.
IT104asSignMent
#1.Why has been there a dramatic increase in the number of computer related security incidents in recent years?
ans:
#2.What are some cheracteristics of common computer criminals including their objectives?
ans:
Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat.
#3.What actions must taken in response to a security incedent?
ans:
ans:
#2.What are some cheracteristics of common computer criminals including their objectives?
ans:
Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat.
#3.What actions must taken in response to a security incedent?
ans:
Subscribe to:
Posts (Atom)