2013-01-10

Answer to Chapter 11

True/False

1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. T
10.T
11.T
12.F


Multiple Choice

1. B) Rootkit
2. D) All of The Above
3. A) Denial of Service Attack
4. C) Digital Forensics
5. C) Hardware Theft
6. D) Encryption Key
7. D) Power Usage Effectiveness (PUE)
8. C) Social Engineering


Matching

1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10.F

Short Answer

1. Antivirus scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.

-> Virus hoax is an email message that warns users of nonexistent virus or other malware.


2. Encourages manufacturers to create energy-efficient devices that required little power when they are not in use.
-> Do not store it, recycle and refurbish it.

3. The right of individuals and companies to deny or restrict the collection and use of information about them.

-> Fill in only necessary information on rebate, warranty and registration forms.
-> Have an unlisted or unpublished telephone number.
-> Do not write your telephone number on charge or credit receipts.
-> Avoid shopping club and buyer cards.
-> Purchase goods with cash, rather then credit or checks.

4. -> Dont click web site link in an e-mail message; instead, retype the web address in your browser.
->  Install phishing filter.

Click-jacking tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages


5. Many businesses use content filtering to limit employees' web access.

ICRA created a content description system which allowed webmasters and digital content creators to self-label their content in categories such as nudity, sex, language (vulgar terms etc.), violence, other potentially undesired material and online interactivity such as social networking and chat. There are context variables such as art, medicine and news—for example, a piece of content or site can be described as having depictions of nudes, but they are in an artistic context. A key point is that ICRA does not rate internet content, nor do they make value judgements about sites – the content providers self-label, and then parents and other concerned adults make a decision as to what is or is not appropriate for themselves or their children.

The labelling was done using a web-based questionnaire. The content creators checked which of the elements in the questionnaire are present or absent from their Web sites, and a small file is automatically generated using the RDF format, which is then linked to the content on one or more domains. Formerly, the system was based on PICS.

Users, especially parents of young children, could then use content filtering software to allow or disallow various types of content. One such application, ICRAplus, was maintained by ICRA itself. ICRA also had a validator which tested all versions of ICRA and old RSACi labels.

The descriptive vocabulary was drawn up by an international panel and designed to be as neutral and objective as possible. It was revised in 2005 to enable easier application to a wide range of digital content, not just websites.

The ICRA also intended to launch a service to verify the accuracy of ICRA labels and to provide this information to third-party tools and services, such as search engines.

Alternative labelling projects include Quatro, an EU-funded project which integrates content labels with quality and trust marks, and its successor, QuatroPlus.

Tidak ada komentar:

Posting Komentar