This topic contains a solution. Click here to go to the answer

Author Question: Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would ... (Read 30 times)

joe

  • Hero Member
  • *****
  • Posts: 627
Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would place in Quadrant III and explain why you would classify them as Quadrant III threats.

Question 2

In a paragraph, explain why early computer security efforts focused on controlling the physical environment in which computers operated.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

cat123

  • Sr. Member
  • ****
  • Posts: 310
Answer to Question 1

Quadrant II represents threats that are deemed high risk and very likely to occur. Threats include impostors, eavesdroppers, and thieves. An eavesdropper, in this context, is a person or device that can listen in on and copy Internet transmissions. People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers.
A cracker is a technologically skilled person who uses their skills to obtain unauthorized entry into computers or network systems  usually with the intent of stealing information or damaging the information, the systems software, or even the systems hardware.

Answer to Question 2

When businesses began using computers, they adopted many of the militarys security methods. They established security by using physical controls over access to computers. Alarmed doors and windows, guards, security badges to admit people to sensitive areas, and surveillance cameras were the tools used to secure computers. Back then, interactions between people and computers were limited to the terminals of large mainframe computers. There were very few networks of computers and those that existed did not extend outside the organization to which they belonged. Thus, computer security could be accomplished by managing the activities of the few people who had access to terminals or the computer room.




joe

  • Member
  • Posts: 627
Reply 2 on: Jul 7, 2018
Thanks for the timely response, appreciate it


EAN94

  • Member
  • Posts: 307
Reply 3 on: Yesterday
:D TYSM

 

Did you know?

On average, the stomach produces 2 L of hydrochloric acid per day.

Did you know?

ACTH levels are normally highest in the early morning (between 6 and 8 A.M.) and lowest in the evening (between 6 and 11 P.M.). Therefore, a doctor who suspects abnormal levels looks for low ACTH in the morning and high ACTH in the evening.

Did you know?

Children with strabismus (crossed eyes) can be treated. They are not able to outgrow this condition on their own, but with help, it can be more easily corrected at a younger age. It is important for infants to have eye examinations as early as possible in their development and then another at age 2 years.

Did you know?

Symptoms of kidney problems include a loss of appetite, back pain (which may be sudden and intense), chills, abdominal pain, fluid retention, nausea, the urge to urinate, vomiting, and fever.

Did you know?

When Gabriel Fahrenheit invented the first mercury thermometer, he called "zero degrees" the lowest temperature he was able to attain with a mixture of ice and salt. For the upper point of his scale, he used 96°, which he measured as normal human body temperature (we know it to be 98.6° today because of more accurate thermometers).

For a complete list of videos, visit our video library