This website uses cookies to ensure you have the best experience. Learn more

Computer Science Essay

2155 words - 9 pages

Question 1. [Pg. 242]
1. [Challenge exercise 9.1.] Windows vulnerability (Passwords)

One of windows vulnerabilities is that user accounts may have weak, nonexistent or unprotected passwords. The operating system and some third-party applications may create accounts with weak or nonexistent passwords. This in turn causes data to be vulnerable and with respect to user data it could be very damaging to a user’s organization if data is lost or removed without warning by an attacker.
Also the connection of these systems to a shared network or perhaps the internet in the scenario of a business organization leaves the system vulnerable to an attacker.

With respect to the data that is ...view middle of the document...

This mode is also based on policy which include of shielding sensitive data, enforcing controls, and reporting and auditing to ensure policy compliance.

Source:

http://www.altiusit.com/files/blog/Top10WindowsVulnerabilities.htm

Question 2. [Pg. 271]
With reference to the question this are verifiable links
http://www.ucs.cam.ac.uk/support/windows-support/winsuptech/ntsecchk
https://help.unc.edu/help/windows-security-checklist/
http://www.selectrealsecurity.com/security-checklist
From the information gathered from all three websites, some items were compiled as security checklist and they are as follows in the table below;
The table consists of the information gathered on the security checklist in windows and also the measures to be taken upon a security check. The ‘implication’ column describes what could occur once the item is not addressed

CHECK LIST | PROCEDURE | DESCRIPTION | REMARKS |
Physical Security Procedures | 1. Keep systems in a secure office or preferably a dedicated room. 2. Network storage should be used if affordable and justifiable. | 1. No-one but system administrators should have direct access to your servers. Dedicated server rooms are generally necessary for larger infrastructures for proper air conditioned environments. 2. Network storage is normally highly redundant (RAID hot swap, multiple power supplies etc.) and with a sensible authentication infrastructure (ie. 2 or more servers capable of providing authentication) you will be able to maintain high availability of data. | 1. The computer system could get stolen or possible be damaged if not kept in a secure place 2. If not addressed the data stored will be |
Operating System Procedures | 1. Apply the latest post-service pack hotfixes 2. Logoff all Servers when you have finished using them (do not use Lock Workstation) | 1. Hotfixes address security issues - Currently Microsoft release these on the second Tuesday of every month and can also release additional emergency patches. There are very few reasons to not update your systems. 2. Reduce exploits which rely on Administrator being logged in | 1. System would be vulnerable to that bug if update is not executed 2. Users can perform administrator operations |
Account Related Procedures | 1. Make Administrative passwords very complex and minimum length 14 | 1. Repels dictionary attacks and makes brute force attacks difficult | 1. The users system will be compromised |
Set User Right Policies | 1. Force Shutdown from a Remote System - Administrators/Server Operators only | 1. No user needs this right | 1. Else the entire system will be compromised and any user at any point in time could interrupt system activity |
File System Procedures | 1. Format all volumes as NTFS | 1. You can only set file system permissions on NTFS volumes, FAT systems have no security. | 1. If not addressed file system permission set otherwise will not be...

Other Papers Like Computer Science

Computer Science Notes Essay

5011 words - 21 pages hypothetical computer called Java Virtual Machine the JVM has an instruction set and manipulates various memory areas at run time the compiler places the bytecode to be interpreted by the JVM into a class file THEN the JVM interprets the bytecode in the class file to execute the program there are separate class files for JVM to run, it must be able to locate the class file with the bytecode JVM uses an envio variable named CLASSPATH to help it search

College Essay for Computer Science

777 words - 4 pages It was the year 1994 when I was first introduced to a computer in school and 10 years later, i.e., 2004 I found myself pursuing Engineering program in the Aligarh Muslim University, with computer science as major. And in those 10 years, I continued getting fascinated more and more by the extensive use of computer technologies in every walk of life. The very first program I wrote in school was a simple BASIC one to calculate the factorial of a

Computer Science: The Underlying Processes

1572 words - 7 pages The list of advances made in computer science is endless and involves just about everything imaginable. In many ways, the advances that have happened over the last few decades have laid the foundation for a much more profound change in the years ahead. "Today there are about a billion PC's in use around the world". (Network World, 2008) Computers are available everywhere, in the office and the home, in our cars, in stores and restaurants. We use

Computer Science

954 words - 4 pages his account. Thus, if the bank has 1,000,000 customers, then this programmer would get $10,000 each month from this salami slicing attack. What type of malware is such a program? Question 8 There was an email joke chain letter that called itself the Amish virus. It stated that its author had no computer available in order to write it; hence, it can't run as an executable program or document macro. Instead, it asked the recipient to forward the

Computer Science

1621 words - 7 pages technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by

Computer Science

557 words - 3 pages Exercises 1. Compare the processors’ access to printers and other I/O devices for the master/slave and the symmetric multiprocessing configurations. Give a real-life example where the master/slave configuration might be preferred. 2. Compare the processors’ access to main memory for the loosely coupled configuration and the symmetric multiprocessing configurations. Give a real-life example where the symmetric configuration might be

Computer Science - 684 words

684 words - 3 pages connected SQL Azure database. A data definition language or data description language (DDL) is syntax similar to a computer programming language for defining data structures especially database schemas. Schema objects do not have a one-to-one correspondence to physical files on disk that store their information. However, Oracle databases store schema objects logically within atablespace of the database. The data of each object is

Computer Science - 714 words

714 words - 3 pages Email objective | Template email | 1. Applying approval mail sent to unit manager. | Dear Unit manager,Please note that I applied for the new announced position sent from the recruitment side as my interest to have career development and I am kindly seeking your approval as mandatory to complete the applying cycle process or the request will be not eligible Many Thanks | 2. Not eligible reason. |  Dear Employee,Thank you so much for

Computer Science Siwes Report on Time and Attendance Management (Jantek)

4678 words - 19 pages KOGI STATE POLYTECHNIC SCHOOL OF APPLIED SCIENCES, MATHS/STAT/COMPUTER SCIENCE DEPARTMENT PMB 1101, LOKOJA, KOGI STATE A TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) AT THE TIME OFFICE, DANGOTE CEMENT PLC OBAJANA BY AIYEDE JOHN E. 2010/ND/CPS/370 IN PARTIAL Fulfillment of THE REQUIREMENT FOR THE AWARD OF NATIONAL DIPLOMA (ND) IN COMPUTER SCIENCE. FEBRUARY 2012. CHAPTER ONE

Computer Science Industrial Attachment

1081 words - 5 pages resulting information is displayed in such a pattern that is very easy to understand. Boston:McGraw-Hill Irwin,(2004). Executive information system is ‘a computer based system that serves the information that is needed by the various top executives. It provides very rapid access to the timely information and also offers the direct access to the different management reports.’ Executive Information System is very user friendly in the nature. It

Computer Science Xyz Company

1026 words - 5 pages About Organization: ABC Inc. is a leading telecom provider with a customer base of over million of users. It provides all the telephone and internet services to its customers. Management Controls Risk Management ABC Inc. is ready with the disaster recovery technique, so the risks can be handled in the organization with care and proper management; they are also maintaining a risk assessment report. Review of Security Controls They have

Related Essays

Computer Science Essay 802 Words

802 words - 4 pages COMPUTER SCIENCE PROJECT FILE ON BOOK-SHOP PROJECT PREPARED BY: SUKHJEET SINGH XII-C SESSION:2014-2015 VIVEKANAND PUBLIC SCHOOL TABLE OF CONTENT * Acknowledgement * Certificate * Introduction * Hardware and Software Requirement * Header Files & their purpose * Files Generated * Coding * Output * Bibliography ACKNOWLEDGEMENT It would be my utmost pleasure to express my sincere

Computer Science Essay 823 Words

823 words - 4 pages Computer Science (083) Practical File for Class XI | Index for C++ Programming | | SN. | Program Description | Topic | 1. | Write a program to play the following game:The player guesses a number from 2 to 19 and then the program generates three random numbers from 101 to 199. If the sum of the digits of any of these numbers matches the player’s number, then the player is declared a winner otherwise the player looses the game. | C

Computer Science Essay 4919 Words

4919 words - 20 pages ] Figure 7.18 [pic] 7a.7 Compound Conditions In English class, you have learned that two complete sentences can be joined together with a conjunction. In Computer Science, two conditions can be joined together with a Logic Operator. There are 4 logic operators: OR, AND, XOR, and NOT. You probably noticed that some of these are also conjunctions in English. To understand how these work, we are going to look at an example of each

Computer Science C++ Essay

6570 words - 27 pages the eve of its new standard. by Danny Kalev Bjarne Stroustrup, inventor of the C++ programming language, is a computer scientist and the College of Engineering Chair Professor of Computer Science at Texas A&M University. He has always been highly involved in the standardization of C++. Since 2004, Bjarne and the standards committee have been busy hammering out the details of a new standard, temporarily titled C++0x. Bjarne was gracious enough