Chapter 17 Continued
List at least four guidelines related to password creation and management.
1. Easy for you to remember but hard for other people to guess. 2. Don't use a simple password, especially one that relates to you personally, like you dog's name. 3. Don't write down a password anywhere that other people can access. 4. Don't stay logged into an account and then walk away from your computer.
Describe the two techniques used by antivirus software to identify malware.
1. Signature Detection- looks for recognizable patterns of particular malware within executable code. 2. Heuristics- looks for more general patterns than the strict signature detection approach, so that it can hopefully detect an entire family of similar malware.
Describe a buffer overflow and how it might make a computer system vulnerable.
A defect in a computer program that could cause a system to crash and leave the user with heightened privileges. If a program attempts to store more information than a buffer can accommodate, a system crash could occur.
Describe how Trojan horse attacks a computer system.
A malicious program disguised as a benevolent resource.
What is password management software?
A program that helps you manage sensitive data, such as passwords,in a secure manner.
How does man-in-the-middle attack work?
A security attack in which network communication is intercepted in an attempt to obtain key data.
What do we mean when we say a computer virus is self-replicating?
A system is copying itself.
What is a digital signature?
Data that is appended to a message, made from the message itself and the sender's private key, to ensure the authenticity to the message.
What is GPS? How is it used to support cell phone applications?
Global Positioning System. A system that uses satellites to pinpoint the location of any GPS receiver. The information is used for mapping programs and other apps, but is stored unencrypted and unprotected.
What is the goal of CAPTCHA interaction?
It's designed to present a problem easy enough for all humans to solve but difficult for an automated program to complete.
Is "diningroom" a good password? Why or why not?
No, it does not contain any uppercase letters, numbers, or special characters. It's also easy for someone to guess.
Is "fatTony99" a good password? Why or why not?
Yes, it contains more than 6 characters, at lease one upper and lowercase letter, and contains digits. It would also be hard for someone to guess.