• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
What security measures can reduce or eliminate intellectual property theft?
Technologies that reduce or eliminate intellectual property theft include software metering, digital watermarks, and digital envelopes. Software metering systems use the Internet to detect unauthorized copies of digital content. Digital watermarks provide a way of embedding a hidden identifier in a digital file, such as a graphic or audio file. Digital envelopes prevent viewing of content without the user injuring a key code.
What do all digital watermarks do at a minimum?
Identify the source of intellectual property.
What are digital certificates used for?
Verify the user or web site is who they claim to be.
What does encryption do?
It converts data so that it cannot easily be read without knowing the secret code.
Would hash coding be sufficient for sending a credit card number over the Internet? Why or why not?
No. Hash coating simply the shores that the message has not changed; it does not prevent the data from being viewed.
For secure e-mail communications, which is generally better, public key or private key encryption? Why?
Public key encryption, because any user can use the public key to encrypt message. This allows messages to be sent without a preliminary transaction.
Will the firewall protect the corporate Web server from unauthorized access? Why or why not?
No. The firewall protects servers and network resources within the private, trusted network. A Web server is generally located outside the trusted area of the network has its purpose is to provide information to the outside world.
For each of the following related and separate issues of protecting intellectual property, protecting the client computer, protecting the transaction, and protecting the server identify the respective technologies that address the issue.
Intellectual property theft -- software metering, digital watermarks, and digital envelopes. Protecting the client computer – anti-virus software, not installing files or executing attachments from unknown sources, certificates. Protecting the transaction -- message encryption and hash coding. Protecting the server -- digital certificates, username/password pairs, and access control lists on the Web server; firewalls; secure sockets layer(SSL) and the secure hypertext transfer protocol(S-HTTP)
What are the three common categories of firewalls and what is the firewall?
Firewalls protect a network by establishing a line of defense between the network and other networks. Computers that pass all traffic both inbound and held onto their systems permitting only authorized traffic to pass are firewalls. Three types of firewalls are packing filters, the way servers, and proxy servers. Packet filters examine the data flowing between the secure network in the Internet and permits organize access according to some preprogrammed set of rules. Gateway servers screen traffic taste on the application to a request. And proxy servers are computers that articulate with the Internet on behalf of the commercial network to determine whether the request should be passed along to the commercial network.
SSL and S-HTTP, both do what?
Both systems encrypt outgoing messages in the encrypt incoming messages automatically and transparently.
Is it difficult to obtain SSL capabilities?
No. All significant Web servers on the market today have SSL capabilities as a standard feature.