Friday, April 1, 2011

Chapter 10 4RQs

1) What are intellectual property laws and how do they apply to software?
        Intellectual property law is the results of intellectual activites in the arts, science, and industry. It applies to software by helping the software be more active.
2) Describe several different types of programs that can be used for software sabotage.
  • viruses:
  • worms
  • Trojan horse
  • Spyware
  • Virus wars
3) What are two inherent characteristics of computers that make security difficult?
  1. A comp does exactly what it is programmed to do, including reveal sensitive info. Any system that can be programmed can be reprogrammed by anyone with sufficient knowledge.
  2. Any comp can do only what it is programmed to do. It cannot protect itself from either malfunctions or deliberate attacks unless such events have bee specifically anticipated thought through and countered with appropriate programming.
4) Describe several different computer security techniques, and explain the purpose of each.
  • passwords: restrict access to comp systems
  • firewalls: keep their internal networks secure while enabling communication with the rest of the Internet.
  • encryption: software to scramble transmission
  • encryption key: the message can be transmitted or stored as an indecipherable garble of characters.
  • audit-control software: monitor and record comp transactions as they happen so auditors can trace and identify suspicious comp activity

No comments:

Post a Comment