Premium Essay

Controlling a Computer

In:

Submitted By McSlurp
Words 543
Pages 3
R1. Describe the three strategies people often use to make security decisions. The three strategies or choices that individuals commonly use are Rule-Based Decisions, Relativistic Decisions, and Rational Decisions (Smith, 2013). Rule-Based Decisions are “made for us external circumstances or established, widely accepted guidelines” (Smith, Page Three). Then there are Relativistic Decisions that attempt to “outdo others who are faced with similar security problems” (Smith, 2013). Finally, Rational Decisions perhaps just as the title insinuates are “based on a systematic analysis of the security situation” (Smith, Page Three).
R2. What is the hunter’s dilemma? Perhaps a good example of the “Hunters Dilemma” is Relativistic Decisions (Smith, Page Three). The Hunters Dilemma can be described as you putting yourself into a situation where a “group of hunters with you encounter an angry bear” (Smith, Page Four). Certainly, the bear will be able to run faster than you and the new dilemma at hand is how to escape (Smith, Page Four). The sad honest truth is that it really is not the bear that you have to outrun but perhaps one or two of the other hunters that are with you (Smith, Page Four). This logic is very important, even though I have never heard of it referred to in this fashion. It did help me understand it better though and know I know what Relativistic Decisions refer to better now. The logic is that you do not have to be the safest or the most cautious person on the Internet you just need to attempt to be better at it than everyone else. For example, I personally believe that if you make it a hassle for a cybercriminal to breach your accounts or steal your data they take the simplest action, which is, move onto the next best target.
R3. Explain the role of “reasoned paranoia” in the security process. “Reasoned Paranoia” is perhaps best thought of as

Similar Documents

Premium Essay

Security from the Ground Up & Controlling a Computer

...R1. Describe the three strategies people often use to make security decisions. There are three strategies for security that people can employ. The first is a rule-based decision. A rule based decision are established by external circumstances which security personal have deemed a threat that is anticipated and are widely accepted as guidelines to follow. The second strategy is relativistic decisions. Relativistic decisions are when you look at other security systems from other companies and you make yours one step above theirs making you a harder target thus, making those around you an easier score. You don’t have to have the best system but the strongest system around you basically. The third and final security decision is rational decisions. Rational security is the process of probing where the weak points are in your security system and identifying potential threats before they happen. (Smith, 2013) R2. What is the hunter’s dilemma? The hunters dilemma is when you are a few of your buddies are out in the middle of nowhere and an angry bear pops out and starts chasing you. The dilemma is that you don’t have to be faster than the bear, just not be the slowest person in the group. Basically, it is Darwinism at its finest. (Smith, 2013) R3. Explain the role of “reasoned paranoia” in the security process. Reasoned paranoia is a mind-set that identifies potential threats to the system. It is like what the Department of Homeland Security does where they have a think tank...

Words: 476 - Pages: 2

Free Essay

Security from the Ground Up & Controlling a Computer

...The first thing I did was try to understand the word paranoia. After checking a few dictionaries I found that it was a psychotic disorder characterized by delusions of persecution, grandeur, or excessive distrust. What is a delusion? It's a false belief held despite evidence to the contrary. Are extreme security measures acting on false threats that don't really exist? Some consider some of my security strategies a bit extreme. I call it meticulous precaution. Sure, the threat might not be real. No one may ever actually want what you have on your PC. But does that really matter? Does the threat have to be real to warrant strong security? Sometimes I have a "Password Day" where I change every password I own on the same day, just in case someone might happen to have one of my passwords. I frequently change my passwords after traveling. Its not that I think someone is trying to hack me, but I also don't think someone is not trying to hack me. That's really not the point. There's no need to analyze the threat of every situation. Just practice strong security always and you should be okay. I frequently see people posting PGP signed e-mails to security mailing lists. It's not that these people are afraid of someone actually spoofing fake comments from them on the latest CGI flaw; they just make it a practice to sign every e-mail, no matter how trivial it might be. Sure, these people are signing e-mails when it's really not important, but I doubt they get caught not signing...

Words: 395 - Pages: 2

Free Essay

Computer

...ROLE OF COMPUTERS About two hundred years before, the word "computer" started to appear in the dictionary. Some people even didn't know what is a computer? However, most of the people today not just knowing what is a computer, but understand how to use a computer. Therefore, computer becomes more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our life. Computers have brought about a tremendous revolution in every walk of life and are expected to open more vast fields due to the dexterity of those who design software and those who develop application programs. In a very short period, scientists have been able to extirpate all the defects, the limitations and the shortcoming of computer and much is expected from their ingenuity, acumen and acquisitiveness. The fields of application of computers are various and new applications are being searched out. The scientists applied it to prediction of weather earthquakes, and storms, controlling of satellites and controlling of atomic reactions in reactors and else where. Engineers have not lagged behind. They use computers in designing cars aeroplanes, ships, buildings, bridges and tools etc. In the business world, computers are playing great parts. They are used to word processing, record keeping, inventory controlling, patrol processing, account keeping and auditing, stock marketing and ticket reservations. They are now used to keep personal telephone and address...

Words: 658 - Pages: 3

Free Essay

Nas Network-Attached Storage

...xample apparatus and methods concern a file system based interface between a disk-based network attached storage device and a linear tape open (LTO) linear tape file system tape. One example method may include controlling a device (e.g., backup server) to read a file from the NAS device using a shared file system (e.g., NFS, CIFS) and controlling the device to write the file to the LTO tape device using the LTFS. Since the NAS device and the LTO device may have different information or metadata requirements, and since the shared file system and the LTFS may have different information or metadata requirements, the method may include controlling the device to remove from the file information specific to the NAS and the shared file system. Additionally, the method may include controlling the device to add to the file information specific to the LTFS or the LTO device. Inventors: Wideman, Roderick B. (Shakopee, MN, US) Claim: 1. A computerized method, comprising: accessing a shared file system on a network attached storage (NAS) disk-based device; accessing a tape file system on a linear tape open (LTO) tape-based device; and exchanging a file between the shared file system and the linear tape file system using a file system based approach throughout the exchange, where exchanging the file includes reading the file from a mounted shared file system volume on the NAS device using the shared file system, and providing the file to a linear tape file system (LTFS) volume on the LTO...

Words: 1151 - Pages: 5

Free Essay

3d Mouse Controlling with Wrist Watch

...International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 10, October 2014 3D Mouse Controlling with Wrist Watch Jayaprakash Nagaruru Abstract: Human Computer Interaction plays a key role in daily life like controlling Mouse operations, Keyboard operations and Gaming modes like Xbox. Human Computer interaction occurs in three different ways 1.Physical 2.Cognitive and 3. Affective. In our work, we are concentrated on Cognitive Mouse Pointer Controlling and Virtual Mouse Pointer Control Using RGB Technique .Cognitive Mouse Control is based on RF Communication with the help of MSP430 Transmitter inbuilt in watch and Watch as a Transmitter and USB RF CC1111 as a receiver. User can control the mouse movements and it operations by tilting the watch in 3-Axis/3-D and Fitt‟s law play‟s the key role in mouse controlling. In Cognitive Mouse control user controls the mouse action by establishing the RF Communication between user and system. It works in >1GHz frequency range and in virtual mouse is based on Image Subtraction Algorithm and user has to wear different colour sticker to control the operations. Keywords: Human Computer Interaction, Image Processing, RF Communication, Texas MSP430, Fitt‟s law. V.Ravi Kumar Manasa Nagaruru Much of our technology for creating and displaying colour is based on empirical observation that a wide variety of colours can be obtained by mixing green, red and blue light in different proportions. For this...

Words: 1537 - Pages: 7

Free Essay

Wannabe

...A computer is a machine that is able to take information (input), do some work on or make changes to the information, to make new information (output). Computers have existed for much of human history. Examples of early computers are the astrolabe and the abacus. Modern computers are very different from early computers. They are now very powerful machines that are able to do billions of calculations every second. Most people have used a personal computer in their home or at work. Computers are useful for many different jobs where automatic tasks are useful. Some examples are controlling traffic lights, vehicle computers, security systems, Washing machines and Digital Televisions. A person (called a user) can control a computer by telling it to do things. Some ways of controlling a computer are with a keyboard, mouse, buttons, touch screen. Some very new computers can also be controlled with voice commands or hand gestures. Computers can be designed to do anything with information. Computers are used to control factories, which in the past were controlled by humans. They are also in homes, where they are used for things such as listening to music, reading the news, and writing. Modern computers are electronic machines. A computer is only useful if it has both hardware and software. Hardware is the physical parts the computer is made of - for example keyboard, mouse, screen, tower, and the circuits inside it. Software is the computer programs (mathematical instructions)...

Words: 404 - Pages: 2

Free Essay

Computer

...A computer is a machine that is able to take information (input), do some work on or make changes to the information, to make new information (output). Computers have existed for much of human history. Examples of early computers are the astrolabe and the abacus. Modern computers are very different from early computers. They are now very powerful machines that are able to do billions of calculations every second. Most people have used a personal computer in their home or at work. Computers are useful for many different jobs where automatic tasks are useful. Some examples are controlling traffic lights, vehicle computers, security systems, Washing machines and Digital Televisions. A person (called a user) can control a computer by telling it to do things. Some ways of controlling a computer are with a keyboard, mouse, buttons, touch screen. Some very new computers can also be controlled with voice commands or hand gestures. Computers can be designed to do anything with information. Computers are used to control factories, which in the past were controlled by humans. They are also in homes, where they are used for things such as listening to music, reading the news, and writing. Modern computers are electronic machines. A computer is only useful if it has both hardware and software. Hardware is the physical parts the computer is made of - for example keyboard, mouse, screen, tower, and the circuits inside it. Software is the computer programs (mathematical instructions)...

Words: 405 - Pages: 2

Premium Essay

Chinese Room Argument

...Searle called “strong AI (Artificial Intelligence).” Searle’s “thought experiment” starts with this theoretical proposition: assume that “artificial intelligence” has been successful in developing a computer that carries on as though it comprehends Chinese. It takes Chinese characters as data by following a guideline of a computer programs, generates other Chinese characters,...

Words: 988 - Pages: 4

Premium Essay

Where Am I Daniel Dennett Analysis

...I find this article truly interesting because of its real world plausibility and because it has forced me to think in ways that I have not thought before. In Daniel Dennett’s article “Where Am I?” we must ponder where Dennett is, is he with Yorick his Brain, Hamlet his body, Hubert the computer version of his brain, or is Dennett just with Dennett. This article is so interesting because all of these possibilities are plausible Dennett could be with Yorick, his brain in a vat or any of the other possibilities. In “Where Am I?” Dennett is invited by a group of scientists to participate in a mission to retrieve a radioactive warhead a mile under Tulsa. The scientists must separate Dennett’s brain and his body due to the radioactivity of the...

Words: 1690 - Pages: 7

Free Essay

Technology in Restaurants

...industry because dependency on computers is the remarkable key to run the business. Computers in restaurants are the key to create the experience that experts want to introduce to guests, to support the changes of a modern society and the information technology that is constantly changing; we are the consumers of a competitive world of technology. The technology that is being used in the business has become innovative and to take a look back on how restaurants ran before technology hit the industry is remarkable. Computers The biggest change in the restaurant business since the creation and introduction of the stove controlled by gas and the electric refrigerator is the implementation of computers (Mandabach, Blanch, Van Leeuwen, & Waters, 2006) “The restaurant industry is no longer a business of cigar boxes and order pads. In most cases restaurant managers use more technology than we used to send men to the moon” (Hamilton, 2004). The transcendental innovation of technology has created a competitive system between experts in the field and the philosophy to avoid looking back in time when restaurants used to run with just a kitchen and a few tables. Comparing the experience of a visit to a modern eating establishment with the same basic hospitality atmosphere versus a more typical restaurant, the chances are that thanks to the technology, the expectations are going to be higher as whole for the current generation than for old fashioned guests. Computers have become one successful...

Words: 1468 - Pages: 6

Free Essay

Computer Simulated World

...completely off the wall. The one conspiracy theory that caught my interest out of all the others though, was the idea that we are living in a computer simulation created by an intelligent race. Many of the most intelligent people in the world believe we are actually living in a computer simulated universe, and these are some of the most brilliant minds in the world. The computer simulation theory is primarily based around the matrix movie which I have a small picture of in Figure A (hitman, 2011), but not entirely based around it. In the theory, scientists believe that we are all in a computer simulation being run by a higher being or beings. One of the biggest arguments here would probably be that we have free will, so we cannot just be in a simulation. Many people believe though that God works in mysterious ways and in the end has a master plan for us all. What if God is just controlling us just like we control characters on games like the Sims, and we just think that we are actually in control of our destinies? One of the leading theories scientist claim proves this idea is the Brain-In-A-Vat Argument. In this theory a person’s brain is removed from their body and is floating in life sustaining fluid. The brain then is connected with wires that simulate the impulses it would normally be receiving, all being sent by the computer creating the simulation. The person would have all completely normal experiences without any of them being related to any objects or events in...

Words: 1814 - Pages: 8

Free Essay

It Specialist

...communication, quick to pick up new skills and eager to learn from others. I also have lots of ideas and enthusiasm. I am looking forward to meeting you as soon as I am considered to further discuss my qualifications and experience. You may reach me at this number, 240-423-8250. Thank you for your consideration & I look forward to hearing from you soon. Yours Sincerely, Tadesse, Yared Assefa 0 Date – July/28/2013 CURRICULUM VITAE YARED ASSEFA TADESSE Nationality: Ethiopian Sex: Male Date of Birth: 1974 E.C Contact Numbers: 240-423-8250 Email: yareda2@gmail.com KEY QUALIFICATION AND EXPERTISE SUMMARY Recently I work as a Technical Consultant and Engineer position in one of the leading IT solution provider in Ethiopia creative computer systems. I have a BSC degree in Management Information System (MIS). While working in this position, I have been adding a lot of Microsoft & other certification. Recently I did a lot of big projects at: 1. African union – desktop deployment using Microsoft product system center configuration manager. 2. African union – record management using Microsoft product SharePoint 2010 3. Ethio Telecom – proof of concept project (POC) in four major Microsoft product windows 2008 R2, Exchange server 2010, SCCM 2007...

Words: 1812 - Pages: 8

Premium Essay

Exam Paper

...explain the nature and importance of control, control is the management function that involves monitoring activities to ensure that they're being accomplished as planned and correcting any significant deviations. The purpose of control is to ensure that activities are completed in ways that lead to accomplishment of organizational goals. Control is important because it's the only way that managers know whether organizational goals are being met and if not, the reasons why. The value of the control function can be seen in three specific areas which is planning, empowering employees, and protecting the workplace. As the final step in the management process, controlling provides the link back to planning. If manager didn't control, they'd have no way of knowing whether goals were being met. The second reason controlling is important is because of employee empowerment. An effective control system can provide information and feedback on employee performance and minimize the chance of potential problems. The final reason that managers control is to protect the organization and its assets. Managers must protect organizational assets in the event that any of threats such as natural disasters, financial pressures and scandals,security breaches should happen. Comprehensive controls...

Words: 1459 - Pages: 6

Premium Essay

Managing Financial Principles and Techniques

...Be able to apply cost concepts to the decision-making process 2 2. Be able to apply forecasting techniques to obtain information for decision making 4 3. Be able to participate in the budgetary process of an organization 5 4. Be able to recommend cost reduction and management processes for an organization 7 5. Be able to use financial appraisal techniques to make strategic investment decisions for an organization 8 6. Be able to interpret financial statements for planning and decision making 10 References 12 1. Be able to apply cost concepts to the decision-making process 1.1 explain the importance of costs in the pricing strategy of an organisation The pricing strategy becomes the major element in marketing mix of Dell Computers as it is related to product positioning. When there is a planning for new product launch pricing strategy is important and it requires general sequence of stages involved during pricing the new product. The different steps are as follows: (Daft, 2011) * Developing marketing strategy – helps the company to develop marketing strategy based on market analysis, market segmentation and positioning * Marketing Mix decisions – Defining a product, distribution and its promotional tactics * Estimation of demand curve – Estimating the demand and understand how it varies from quantity wit price * Cost Calculation – Calculation of fixed cost and variable cost associated with product development * Knowledge about environmental factors...

Words: 3451 - Pages: 14

Premium Essay

Nt1110

...NT1110_Antonio Morgan_Module1_Lab.doc An operating system (OS) is a software program that manages the hardware and software resources of a computer. A key component of system software, the OS performs basic tasks, such as controlling and allocating memory, prioritizing the processing of instructions, controlling input and output devices, facilitating networking, and managing files. Modern general-purpose computers, including personal computers and mainframes, have an operating system (a general purpose operating system) to run other programs, such as application software. Examples of operating systems for personal computers include Microsoft Windows, Linux, Mac OS (Darwin), and Unix.  The lowest level of any operating system is its kernel. This is the first layer of software loaded into memory when a system boots or starts up. The kernel provides access to various common core services to all other system and application programs. These services include, but are not limited to: task scheduling, memory management, disk access, and access to hardware devices.  Apart from the kernel, an operating system is often distributed with system software that manages a graphical user interface (although Windows and Macintosh have integrated these programs into the operating system), as well as utility programs for tasks such as managing files and configuring the operating system. Oftentimes distributed with operating systems are application software that does not directly relate to...

Words: 592 - Pages: 3