Monday, March 28, 2011

chapter 10 4RQs

1) Define or describe each of the key terms listed in the "Key Terms" section.
  • access-control software: Software that only allows user access according to the user’s needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change.
  • active badge: A microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database.
  • antivirus: A program designed to search for viruses, notify users when they’re found, and remove them from infected files.
  • authentication mechanisms: Computer network security measures that ensure that only legitimate users have access to the system by asking potential users to identify themselves.
  • authorization mechanisms: Computer network security measures that guarantee that users have permission to perform particular actions.
  • autonomous systems: Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making.
  • backup: The process of saving data—especially for data recovery. Many systems automatically back up data and software onto disks or tapes.
  • biometrics:Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security.
  • computer crime:Any crime accomplished through knowledge or use of computer technology.
  • computer security:Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction.
  • denial-of-service attack (DoS):A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they’re effectively shut down, denying service to legitimate customers and clients.
  • encryption:Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it’s been reconstructed with a matching key.
  • firewall:
  • hacking:Electronic trespassing and vandalism.
  • identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim’s credit cards.
  • logic bomb:A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
  • malware:Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.
  • passwords:The most common security tools used to restrict access to computer systems.
  • sabotage:A malicious attack on work, tools, or business.
  • security patch:Software programs that plug potential security breaches in an operating system, often provided as free downloads or automatic updates to all owners of the OS.
  • smart weapons:A missile that uses computerized guidance systems to locate its target.
  • social engineering:Slang for the use of deception to get individuals to reveal sensitive information.
  • spoofing:A process used to steal passwords online.
  • spyware:Technology that collects information from computer users without their knowledge or consent.
  • Trojan horse:A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
  • uninterruptible power supply (UPS): A hardware device that protects computers from data loss during power failures.
  • virus:Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
  • worms:Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.
2) Why is it hard to estimate the extent of computer crime?
          It is hard to estimate the extent of computer crime because it usually goes undetected and when it is detected it is not reported because businesses fear that they will get bad publicity.

3) Describe the typical computer criminal. How does he or she differ from the media stereotype?
                 The typical computer criminal is a trusted employee with no criminal record who is tempted by an opportunity like a loophole in system security.
                  But some are former employees seeking revenge and some are high-tech pranksters looking for a challenge.
4) What is the most common computer crime? Who commits it? What is being done to stop it?
                Theft is the most common form of computer crime. Students are usually the criminals in this sitruation. The FBI is working hard to stop it by arresting anyone they can get.
           

No comments:

Post a Comment