Monday, January 14, 2013

Exercise Chapter 11 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   True
2.   True
3.   False
4.   True
5.   False
6.   True
7.   True
8.   True
9.   False
10. False
11. True
12. False


Multiple Choice

1. B ( payload )
2. D ( all of the above )
3. A ( denial of service attack )
4. C ( Digital forensics )
5. C ( hardware theft )
6. D ( encryption )
7. D ( power usage effectiveness (PUE) )
8. C ( social engineering )


Matching

1.   j
2.   d
3.   e
4.   g
5.   i
6.   c
7.   b
8.  a
9.   h
10. f


Short Answer

1. * There are two ways that an antivirus programs detect and identify a virus. First, it scans or monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program is a virus. Second, it scans or monitors the programs by analyzing its behavior, such as modification of critical system files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.
    * Virus hoax is a false warning about a computer virus.

2. * ENERGY STAR is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy helping us all save money and protect the environment through energy efficient products and practices.
    * The users should recycle obsolete computers properly. Then, the revamped end product would be sold at a low price or donated to the less fortunate in the society.

3. * Information privacy is considered an important aspect of information sharing. With the advancement of digital age, personal information vulnerabilities have increased.
    * Five ways to protect personal information :
       1. Don't use your primary email address.
       2. Don't give out your phone number.
       3. Don't give out your birth date.
       4. Don't ever give out your credit card number, driver's license number, or Social Security number.
       5. Be savvy, if it's too good to be true, it probably is.

4. * The two best methods for avoiding phishing attacks are first to abandon any outdated email software. Get a Gmail account if you can, they are top of the line in preventing phishing attacks. Another method is to tighten up your browser's security settings.
    * Clickjacking has introduced a new threat to images, links, website, forms, guest-books, bank log in pages, and many more can now be used by hackers to compromise your computer. Attackers now have a way to place invisible code behind web elements mentioned above and there is no way to detect if a page has been compromised.

5. * Content filtering is used by corporations as part of internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.
    * Internet content rating systems define special metadata to describe web content, so-called content labels. The creation of this metadata is generally performed on a voluntary basis by the content providers themselves, who will also technically integrate the rating information into their websites. Another though less common scenario involves third parties in the role of the content rating institution, who will classify content on behalf of others and provide this rating information on request.

No comments:

Post a Comment