CSE 355 Study Guide - Competitive Intelligence, Script Kiddie, Port Scanner

58 views4 pages

Document Summary

Indicate whether the sentence or statement is true or false. Sometimes the data stored on a portable pc is more valuable than the computer itself. It is not a good idea to encrypt the confidential files stored on a computer. Encryption and decryption does tend to slow a computer down slightly when opening and saving files, so encryption is not typically turned on by default. When a computer is connected to a network, security risks decrease a hundredfold. Network operating systems such as windows xp, apple os x, linux, netware, and unix provide methods for associating user permissions with each user account. The project manager is typically the only user who has full access to the system. Usernames and passwords and the login process are the primary way of keeping unregistered users out of the system. A security and network usage policy is a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources.