Wednesday, March 30, 2011

Ch.10 Review Questions

3. Describe the typical computer criminal. How does he or she differ from the media stereotype?
Most computer crimes  are committed by trusted employees with personal or financial problems and knowledge of the computer system. However, the media stereotype of a computer criminal is a bright computer wizard.

8. Describe several different computer security techniques, and explain the purpose of each.
Physical Access Restrictions- identifying people attempting to access computer equipment; computers perform security checks such as key, password, personal questions, signature, typing speed, voice print, fingerprint and ID verification
Passwords- restricts access to computer systems
Firewalls- keeps internal networks secure while enabling communication with the rest of the Internet
Encryption- scramble transmitted information and can only be encrypted with an encryption key the user has; message can only be read after it's been reconstructed with a matching key
Audits- monitors and records computer transactions as they occur so auditors can trace and identify suspicious computer activity it was.

10. In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals?
Computer security usually serves to protect privacy, however, it tends to violate it as well. Computer security threatens our privacy when databases monitor computer uses, telephone calls, and data transmissions

11. What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?
Smart weapons are computerized guided system missiles that locate targets using a computerized system. Smart weapons can reduce the amount of civilian destruction in war as they can accurately pinpoint enemy targets under most circumstances.  A problem with smart weapons is that they reduce the amount of time people have to make life-and-death decisions, and can increase chance of error, which can lead to disaster.
Conventional weapons differ as they allow user more time for decision making than smart weapons.

No comments:

Post a Comment