Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Explain each of the elements. A)Taking security seriously B)Creating Strong Pass

ID: 3695331 • Letter: E

Question

Explain each of the elements. A)Taking security seriously B)Creating Strong Passwords C) Use Multiple PasswordsD) send no valuble data via e-mail or im E) Use https at trusted reputable vendors F) Remove High Value Assets from computersG) Clear Browsing history temp files, and cookies H)Regularly Update antivirus software I) demonstrate security concern J)follow organizational security directives and guidlines K)Consider security for all buisness intiatives (11) Define IDS and explain why the use of an IDS program is sobering to say the least. (2) Define brute force attack.(1) Summarize the characteristics of a strong password.(1) Explain how your identity and password do more than just open doors on your computer.(1) Define cookie and explain why using a program like CCleaner is a good example of the computer security trade-off.

Explanation / Answer

1. IT security is one of the main concern in todays world as we work on internet most of the time we are online on system and access multiple websites and hackers have made such code that they can view your social security numbers/bank account numbers/credit card number/cvv numbers which should be so secure to avoid any bad instance of being misuse so IT security is must for everyone.

2. Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all accounts on your computer. If you're using a corporate network, your network administrator might require you to use a strong password.

3. Multiple passwords are more secure these days for lone applications and for different applications instead of single password to provide more security and access gain so that it could not be guessed or hacked by anyone.

4. As I mentioned in first point any data is transferred over internet through email or IM can be hacked by anyone if the site is not trusted so its forbidden or suggestive to not transfer any valuable data for unauthorized access over email/IM.

5. The usage of HTTPS at trusted vendors implies that data connection over internet should be SECURE as httpS (S- implies for secure connection) and that too on trusted vendors to avoid un-authorized access to your data.

6. As practice network computer or stanalone computer should have secure access with strong password but to simplify we should not keep high value assets on any computer as that too can be hacked and can be used for wrong doings.

7. Everytime we browse on internet we should clear off the history of browing and clear temporary internet files/cookeis after our work as system hackers can manipulate the data/assets by logging thorugh your surfed internet websites by checking from internet history and retained temporary internet files.

8. Everyone should update the antivirus software regularly to avoid system hack or malware being dowloaded on computer everytime system is connected to any application over internet.

9. IT security can be demonstrated to system users by providing network username and password and then further provide upto date antivirus and secure access through tokens as data security is of major concern in todays corporate world as companies has high value assets of clients say like SSN numbers and other valuable things which are un-safe with data security.

10. every system user should follow organizational security directives and guidelines properly to avoid mi-usage/un-authorize access of important data of each client.

11. As I explained earlier Security of data/valuable assets/personal security is must for all business initiatives since crime rate either cyber crime or other crime is at high and data security should not be breached anytime.

12. IDS security : intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. NIDS is a network security system focusing on the attacks that come from the inside of the network (authorized users). Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.

13. Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.

14. What makes a password strong : A strong password:

Is at least eight characters long.

Does not contain your user name, real name, or company name.

Does not contain a complete word.

Is significantly different from previous passwords

15 . A cookie (also called web cookie, Internet cookie, browser cookie or simply cookie), is a small piece of data sent from a website and stored in the user's web browser while the user is browsing. CCleaner (formerly Crap Cleaner), developed by Piriform, is a utility program used to clean potentially unwanted files (including temporary internet files, where malicious programs and code tend to reside) and invalid Windows Registry entries from a computer

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote