Tuesday, March 10, 2015

Printer Hacking

Define printer hacking. List steps you can take to secure printers.

Printer is an output device that produces text and graphics on a physical medium such as paper. Printer hacking is where an individual from within the organization or outside the building can print a document without permission if the network is connected to the internet.

Here are steps to take to secure printers:
  1. Place printers in a secure room, not out in the open.
  2. If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life.
  3. Encrypt documents before sending them to the printer using a secured network.
  4. Restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print.
  5.  Use a printer program to track and report the types of jobs, and keep a record of the users who sent them.
  6. Unplug the printer when it is not in use, or do not connect it to a network.
  7. Update the printer with the latest firmware.


Cloud Computing

List some reasons that home and businesses choose cloud computing. In reference to cloud computing describe the front end and the back end.

Cloud computing refers to an environment of servers that house and provide access to resources users access via the Internet.

Home and business users choose cloud computing for various reasons:

1. Accessibility- Data and/or applications are available worldwide from any computer or device with an internet connection.

2. Cost saving- The expense of software and high-end hardware, such as fast processors and high-capacity memory and storage devices, shifts away from the user.

3. Space savings- Floor space required for servers, storage devices, and other hardware shifts away from the user.


4. Scalability- Provides the flexibility to increase or decrease computing requirement as needed.

Cyberwarfare


What is cyberwarfare? Differentiate among the various categories of cybercriminals

Cyberwarfare describes an attack whose goal ranges from disabling a government’s computer network to crippling a country.

Cybercrime refers to online or internet- based illegal acts such as distributing malicious software or committing identity theft.

Here are the various categories of cybercriminals:

Hacker refers to someone who accesses a computer or network illegally.

Cracker refers to someone who accesses ac0mputer or network illegally

Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use prewritten hacking and cracking programs to break into computers and network

Corporate espionage is a corporate spies hired by is used by unscrupulous company to gain a competitive advantage

Cyberextortionist
is someone who demands payment to stop an attack on an organization's technology infrastructure

Cyberterrorist is someone who uses the Internet or network to damage computers for political reasons

Viruses and Malware


Differentiate among virus, worm, trojan horse, and rootkit. In reference to malware, what is quarantine?

Virus is a potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the user’s knowledge or permission.

Worm resides in active memory and replicates over a network to infect computers and devices, using up the system resources and possibly shutting down the system.

Trojan horse is a destructive program disguised as real problem, such as a screen saver. When a user runs a seemingly innocent program, a Trojan horse hiding inside can capture information, such as user names and passwords, from your computer or enable someone remotely to control your computer

Rootkit is program that easily can hide and allow someone to take full control of your computer from a remote location, often for nefarious purposes.  Rootkit can be dangerous and often requires special software to detect and remove.


If an antivirus program identifies an infected files, it attempts to remove the malware. It the antivirus program cannot remove the infection, it often quarantines the infected file. A quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step that other files will not become infected

Monday, March 2, 2015

Exploring the Features of Google Picasa

Three edited photo files that have also been geotagged







 Poster 









Picture Collage




Movie