This topic contains a solution. Click here to go to the answer

Author Question: Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would ... (Read 46 times)

joe

  • Hero Member
  • *****
  • Posts: 627
Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would place in Quadrant III and explain why you would classify them as Quadrant III threats.

Question 2

In a paragraph, explain why early computer security efforts focused on controlling the physical environment in which computers operated.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

cat123

  • Sr. Member
  • ****
  • Posts: 310
Answer to Question 1

Quadrant II represents threats that are deemed high risk and very likely to occur. Threats include impostors, eavesdroppers, and thieves. An eavesdropper, in this context, is a person or device that can listen in on and copy Internet transmissions. People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers.
A cracker is a technologically skilled person who uses their skills to obtain unauthorized entry into computers or network systems  usually with the intent of stealing information or damaging the information, the systems software, or even the systems hardware.

Answer to Question 2

When businesses began using computers, they adopted many of the militarys security methods. They established security by using physical controls over access to computers. Alarmed doors and windows, guards, security badges to admit people to sensitive areas, and surveillance cameras were the tools used to secure computers. Back then, interactions between people and computers were limited to the terminals of large mainframe computers. There were very few networks of computers and those that existed did not extend outside the organization to which they belonged. Thus, computer security could be accomplished by managing the activities of the few people who had access to terminals or the computer room.




joe

  • Member
  • Posts: 627
Reply 2 on: Jul 7, 2018
Thanks for the timely response, appreciate it


upturnedfurball

  • Member
  • Posts: 334
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

Human kidneys will clean about 1 million gallons of blood in an average lifetime.

Did you know?

As of mid-2016, 18.2 million people were receiving advanced retroviral therapy (ART) worldwide. This represents between 43–50% of the 34–39.8 million people living with HIV.

Did you know?

Hypertension is a silent killer because it is deadly and has no significant early symptoms. The danger from hypertension is the extra load on the heart, which can lead to hypertensive heart disease and kidney damage. This occurs without any major symptoms until the high blood pressure becomes extreme. Regular blood pressure checks are an important method of catching hypertension before it can kill you.

Did you know?

About 3% of all pregnant women will give birth to twins, which is an increase in rate of nearly 60% since the early 1980s.

Did you know?

The first successful kidney transplant was performed in 1954 and occurred in Boston. A kidney from an identical twin was transplanted into his dying brother's body and was not rejected because it did not appear foreign to his body.

For a complete list of videos, visit our video library