This topic contains a solution. Click here to go to the answer

Author Question: Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would ... (Read 36 times)

joe

  • Hero Member
  • *****
  • Posts: 627
Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would place in Quadrant III and explain why you would classify them as Quadrant III threats.

Question 2

In a paragraph, explain why early computer security efforts focused on controlling the physical environment in which computers operated.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

cat123

  • Sr. Member
  • ****
  • Posts: 310
Answer to Question 1

Quadrant II represents threats that are deemed high risk and very likely to occur. Threats include impostors, eavesdroppers, and thieves. An eavesdropper, in this context, is a person or device that can listen in on and copy Internet transmissions. People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers.
A cracker is a technologically skilled person who uses their skills to obtain unauthorized entry into computers or network systems  usually with the intent of stealing information or damaging the information, the systems software, or even the systems hardware.

Answer to Question 2

When businesses began using computers, they adopted many of the militarys security methods. They established security by using physical controls over access to computers. Alarmed doors and windows, guards, security badges to admit people to sensitive areas, and surveillance cameras were the tools used to secure computers. Back then, interactions between people and computers were limited to the terminals of large mainframe computers. There were very few networks of computers and those that existed did not extend outside the organization to which they belonged. Thus, computer security could be accomplished by managing the activities of the few people who had access to terminals or the computer room.




joe

  • Member
  • Posts: 627
Reply 2 on: Jul 7, 2018
Excellent


31809pancho

  • Member
  • Posts: 317
Reply 3 on: Yesterday
Wow, this really help

 

Did you know?

Dogs have been used in studies to detect various cancers in human subjects. They have been trained to sniff breath samples from humans that were collected by having them breathe into special tubes. These people included 55 lung cancer patients, 31 breast cancer patients, and 83 cancer-free patients. The dogs detected 54 of the 55 lung cancer patients as having cancer, detected 28 of the 31 breast cancer patients, and gave only three false-positive results (detecting cancer in people who didn't have it).

Did you know?

The horizontal fraction bar was introduced by the Arabs.

Did you know?

Studies show that systolic blood pressure can be significantly lowered by taking statins. In fact, the higher the patient's baseline blood pressure, the greater the effect of statins on his or her blood pressure.

Did you know?

Congestive heart failure is a serious disorder that carries a reduced life expectancy. Heart failure is usually a chronic illness, and it may worsen with infection or other physical stressors.

Did you know?

Historic treatments for rheumatoid arthritis have included gold salts, acupuncture, a diet consisting of apples or rhubarb, nutmeg, nettles, bee venom, bracelets made of copper, prayer, rest, tooth extractions, fasting, honey, vitamins, insulin, snow collected on Christmas, magnets, and electric convulsion therapy.

For a complete list of videos, visit our video library