Computer Security And Database Management

PAGES
4
WORDS
1313
Cite

Cyberspace and Cyber Security Essentials of Cyberspace and Cyber-Security

It is not surprising much focusing on the overall "security assessment" risk rating that appears at the top of the report. What is critical is the safety of the system bearing in mind the varied insecurity challenges faced with cyber security. While seeking to secure the computer, an efficient and reliable security guard has been installed on the computer. The security system diagnoses and offers alternatives through which it can navigate through and protect the computer while eradicating the insecurity issue (Basta & Zgola, 2011). Moreover, any entry of the insecurity issue will be detected by the system, with the favorable response being provided as part of the options.

Q2a

MBSA takes a bit of time while checking for passwords. This time depends on how many user accounts are present on the computer. Through password check, MBSA enumerates all the present user accounts within a target computer while carrying out limited attempts to change passwords with the use of its common password pitfalls like in the case when the password of an account is similar to its username. While seeking to reduce the consequences of weak password checks belonging to the domain controllers, it carries out a check of passwords against domain controllers, but not full checks since they will take time.

Q2b.

All passwords are prone to attacks through different methods like phishing, dictionary-based attacks, and shoulder surfing. Weak passwords are more prone to attacks as they can be easily cracked or compromised. Their protection by the MBSA is not guaranteed since attempts to crack them become easy. MBSA does not carry out the full check of all passwords, either weak or strong, and hence the maker of the account should be careful enough to take care of this. For corporate passwords, they are being accessed adversely, which increases their level of attacks. Having weak passwords will make them...

...

Attackers target softer parts of the accounts and their accesses like passwords. The existence of a password expiration policy guarantees the protection and safety of passwords. To mitigate the challenges likely to occur when an attacker acquires the password hashes for the system, password expiration hast to be set (Basta & Zgola, 2011). Moreover, this policy aid in minimizing some of the losses and risks associated with losing backups to an attacker. The policy is a safety measure used to protect against any potential risks of an account when the passwords are hacked.
Q3a.

When the passwords or any protection system is not active or updated, it loses its strength to protect against malware. Malware keeps replicating the old version of the settings of a protection system like passwords and antivirus. When they are not updated, they lose their strength and become vulnerable to attacks. The replication of the processes of attacks finally gets to acquire the passwords or the strengths of the protector, thus affecting them. Updating the system and enabling setting of exceptions of the windows firewall aids in protecting against malware.

Q3b.

The types of malware that could be used include Bots, Adware, bug, ransomware, rootkit, and spyware, Trojan horse, among others. The main steps characterize the process of removing malware. It is important to install and run firewall software and anti-malware software in a machine. When choosing malware, it is important to consider tools that assist in quarantining, detecting, and getting rid of many malware. As at lowest capability, the type of malware should just get rid of all malware like Trojan Horses, viruses, spyware, and worms. When a firewall functions together with an anti-malware, the computer is protected against all the existing and incoming…

Sources Used in Documents:

References

Basta, A., & Zgola, M. (2011). Database Security. Boston, Mass: Course Technology.

Ben-Natan, R. (2005). Implementing Database Security and Auditing: A Guide for DBAs, Information Security Administrators, and Auditors. Burlington, MA: Elsevier Digital Press.

Goodrich, M., & Tamassia, R. (2010). Introduction to Computer Security. Boston, Mass: Addison-Wesley

Meyler, K., Fuller, C., & Amaris, C. (2006). Microsoft Operations Manager 2005 Unleashed. Indianapolis, Ind: Sams


Cite this Document:

"Computer Security And Database Management" (2015, October 21) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/computer-security-and-database-management-2159384

"Computer Security And Database Management" 21 October 2015. Web.18 April. 2024. <
https://www.paperdue.com/essay/computer-security-and-database-management-2159384>

"Computer Security And Database Management", 21 October 2015, Accessed.18 April. 2024,
https://www.paperdue.com/essay/computer-security-and-database-management-2159384

Related Documents

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

Database Management Today, nearly everyone in across the world would love to store their information in the database to keep track of everyday activities. Organizations are also not left behind in operating their businesses by storing their information on databases. Databases are designed in a way they offer organized mechanisms for storage, managing and retrieving information. The data are stored and organized in different tables by the use of Microsoft Excel

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

By grouping related database queries into transactions, DBMS systems can guarantee that each transaction satisfies the ACID properties: Atomicity, Consistency, Isolation, and Durability. However, if a database application is decomposed into transactions in an incorrect manner, the application may fail when executed concurrently. Concurrency control deals with the issues involved with allowing multiple people simultaneous access to shared entities (Ambler, 2004). A collision occurs when two activities, which may or

Computer Security Although it is never possible to fully prevent the unauthorized use of information from people with security clearances and access, the use of security clearance and access is important to ensure that people without security clearance cannot access the confidential information. In other words, the concept of 'absolute security' is a chimera. It is the nature of security that makes it necessary to weigh up the threats, the risks,