Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 4IR
Explanation of Solution
Java security flaws from two articles:
- As java in browser is
Operating System (OS) independent and it has the popular run-time environment in desktop browsers, java becomes more attractive target for malicious attacker. - Oracle is decided to move rapidly to fix the java flaws.
- In 2013, Oracle released a critical one-off path update to fix the issue before two weeks of the issue being actively exploited...
Explanation of Solution
Processes of informing users about the need to obtain updates to fix security holes:
- A Critical Patch Update
program is a group of patches for various security vulnerabilities where patches are a set of changes such as update, and fixing the data to a computer system. - Oracle informs the users that they need to be remains in actively supported version and apply for the Critical Patch Update program.
- Critical Patch Update program releases the patches for the product versions covered by premier support or extended support of Lifetime Support Policy...
Explanation of Solution
In the world, there are 5 to 10 billion devices have java installed.
Devices that have java installed:
- In the world, 1.1 billion desktop systems run java...
Explanation of Solution
Ways to identify whether java is installed on a computer
- If the user uses command prompt to identify the installation of java.
- After installing java, the user needs to set “PATH” variable in environmental variables.
- Then, the user types the command “java –version” in terminal.
- After running the above command, if java is installed on a computer then it shows the version of java, java Standard Edition (SE) Environment’s build and Java HotSpot client Virtual Machine’s (VM) build.
- The user can also use program that reads java system properties to identify whether it is installed or not...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
When first released, operating systems and programs may have bugs. There are literally hundreds of bugs in each application. In many cases, when a software problem is discovered, the manufacturer will provide a fix (also known as patches). Criminals launch zero-day assaults the day after a security hole is disclosed to the public. While no one disputes the immorality of the criminals' actions, one can wonder what responsibility a software developer has when its ineptitude or haste to market results in damage to its clients. It is the responsibility of every computer user to install the latest security updates.
Computer Science
Assume you work in the IT department at an organization in Florida. The 500 employees in the organization are diverse in age, gender, race, nationality, and religious preference.
Scenario: You discover pornographic images on a company server, which you are responsible for maintaining. You think that some of the images are of nude children. After a forensics investigation, you cannot trace the origins of images to a specific user in the organization. You discover that dozens of employees, including a co-worker, have viewed the images, but no one has reported the incident.
What do you do? Whom do you inform? Do you delete them? Do you block further access? Do you call the police? What are the legal requirements you must take?
The majority of software, including operating systems, does not function flawlessly at first release. Many thousands of bugs have been found in various application frameworks. Vendor fixes for recognized software issues are often provided (also known as patches). Zero-day attacks are launched by cybercriminals the day after a new vulnerability is disclosed. The immorality of these criminals is without dispute, but what responsibility does a software developer have if its ineptitude or haste to launch causes damage to its customers? Users also have a responsibility to apply any necessary security fixes to their computers.
Chapter 12 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 12 - Prob. 1SGCh. 12 - Prob. 2SGCh. 12 - Prob. 3SGCh. 12 - Prob. 4SGCh. 12 - Prob. 5SGCh. 12 - Prob. 6SGCh. 12 - Prob. 7SGCh. 12 - Prob. 8SGCh. 12 - Prob. 9SGCh. 12 - Prob. 10SG
Ch. 12 - Prob. 11SGCh. 12 - Prob. 12SGCh. 12 - Prob. 13SGCh. 12 - Prob. 14SGCh. 12 - Prob. 15SGCh. 12 - Prob. 16SGCh. 12 - Prob. 17SGCh. 12 - Prob. 18SGCh. 12 - Prob. 19SGCh. 12 - Prob. 20SGCh. 12 - Prob. 21SGCh. 12 - Prob. 22SGCh. 12 - Prob. 23SGCh. 12 - Prob. 24SGCh. 12 - Prob. 25SGCh. 12 - Prob. 26SGCh. 12 - Prob. 27SGCh. 12 - Prob. 28SGCh. 12 - Prob. 29SGCh. 12 - Prob. 30SGCh. 12 - Prob. 31SGCh. 12 - Prob. 32SGCh. 12 - Prob. 33SGCh. 12 - Prob. 34SGCh. 12 - Prob. 35SGCh. 12 - Prob. 36SGCh. 12 - Prob. 37SGCh. 12 - Prob. 38SGCh. 12 - Prob. 39SGCh. 12 - Prob. 40SGCh. 12 - Prob. 41SGCh. 12 - Prob. 42SGCh. 12 - Prob. 43SGCh. 12 - Prob. 44SGCh. 12 - Prob. 45SGCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - Prob. 3TFCh. 12 - Prob. 4TFCh. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 8TFCh. 12 - Prob. 9TFCh. 12 - Prob. 10TFCh. 12 - Prob. 11TFCh. 12 - Prob. 12TFCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - Prob. 3MCCh. 12 - A(n) _____ report consolidates data usually with...Ch. 12 - Prob. 5MCCh. 12 - Prob. 6MCCh. 12 - Prob. 7MCCh. 12 - Prob. 8MCCh. 12 - Prob. 1MCh. 12 - Prob. 2MCh. 12 - Prob. 3MCh. 12 - Prob. 4MCh. 12 - Prob. 5MCh. 12 - Prob. 6MCh. 12 - Prob. 7MCh. 12 - Prob. 8MCh. 12 - Prob. 9MCh. 12 - Prob. 10MCh. 12 - Prob. 2CTCh. 12 - Prob. 3CTCh. 12 - Prob. 4CTCh. 12 - Prob. 5CTCh. 12 - Prob. 6CTCh. 12 - Prob. 7CTCh. 12 - Prob. 8CTCh. 12 - Prob. 9CTCh. 12 - Prob. 10CTCh. 12 - Prob. 11CTCh. 12 - Prob. 12CTCh. 12 - Prob. 13CTCh. 12 - Prob. 14CTCh. 12 - Prob. 15CTCh. 12 - Prob. 16CTCh. 12 - Prob. 17CTCh. 12 - Prob. 18CTCh. 12 - Prob. 19CTCh. 12 - Prob. 20CTCh. 12 - Prob. 21CTCh. 12 - Prob. 22CTCh. 12 - Prob. 23CTCh. 12 - Prob. 24CTCh. 12 - Prob. 25CTCh. 12 - Prob. 26CTCh. 12 - Prob. 27CTCh. 12 - Prob. 28CTCh. 12 - Prob. 29CTCh. 12 - Prob. 1PSCh. 12 - Prob. 2PSCh. 12 - Prob. 3PSCh. 12 - Prob. 4PSCh. 12 - Prob. 5PSCh. 12 - Prob. 6PSCh. 12 - Prob. 7PSCh. 12 - Prob. 8PSCh. 12 - Prob. 9PSCh. 12 - Prob. 10PSCh. 12 - Prob. 11PSCh. 12 - Prob. 1.1ECh. 12 - Prob. 1.2ECh. 12 - Prob. 1.3ECh. 12 - Prob. 2.1ECh. 12 - Prob. 2.2ECh. 12 - Prob. 3.1ECh. 12 - Prob. 3.2ECh. 12 - Prob. 1IRCh. 12 - Prob. 2IRCh. 12 - Prob. 4IRCh. 12 - Prob. 5IRCh. 12 - Prob. 1CTQCh. 12 - Prob. 3CTQCh. 12 - Prob. 4CTQ
Knowledge Booster
Similar questions
- Most software, including operating systems, is not error free when it is first released. Some programs, in fact, contain thousands of problems, called bugs. Software companies regularly release fixes (called patches) to correct known issues with released software. Many hackers and other criminals target these bugs with computer viruses or other attacks, frequently on the day a new vulnerability is announced—called a zero-day attack. Obviously, the acts by these criminals are not ethical, but what responsibility does a software company have to consumers if they are put at risk due to the company’s carelessness or rush to market? What responsibility do consumers have to make sure they keep their computers patched against new vulnerabilities?arrow_forwardMore Malware! Ugh! For this question select a specific type of malware (Trojans Horses, Viruses, Worms, Ransomware) and identify the following (Do not use examples in the book!): What type it is (name the category of malware (see the parenthesis above). How does it infect a computer? How does it get into the computer (most common ways – not an exhaustive list); what does it do once it is there? Are there any well-known examples of this type of malware? Name at least one. Describe the damage done by it (cost of loss or number of systems affected or hack that occurred). What is the best defense against this type of malware? Explain.arrow_forward– Ethical HackingLab #2 – Legal and Ethical Overview Write up a case that pertains to one of the laws mentioned in the course content or another law that is relevant to the cybersecurity landscape. Make sure to include your references. You should use what you learned about Google Hacking to find actual court documents that detail the case, the charges levied, and results of the case. Finding pertinent primary sources of information in this field can be quite a challenge. Pick a case that has occurred in the last 7 years and summarize the main points of the case. Explain which laws were cited in the case and go into detail about why they were applied. You may need to take a closer look at the law in question to describe this. Explain the verdict of the case and your opinion of the ruling based on the law. In your opinion, does the law need reform or will it still apply in the future. Why or whyarrow_forward
- (Computerization of Health Records) A health care issue that has been in the news lately isthe computerization of health records. This possibility is being approached cautiously because ofsensitive privacy and security concerns, among others. Computerizing health records could make iteasier for patients to share their health profiles and histories among their various health care professionals. This could improve the quality of health care, help avoid drug conflicts and erroneous drugprescriptions, reduce costs and in emergencies, could save lives. In this exercise, you’ll design a“starter” HealthProfile class for a person. The class attributes should include the person’s firstname, last name, gender, date of birth (consisting of separate attributes for the month, day and yearof birth), height (in inches) and weight (in pounds). Your class should have a constructor that receives this data. For each attribute, provide set and get functions. The class also should include functions that…arrow_forward1)/////JAVA Scrip// 1 DO NOT COPY FROM OTHER WEBSITES Upvote guarenteed for a correct and detailed answer. Thank you!!!.arrow_forwardViruses are harmful software programs that are difficult to detect and spread swiftly through computer systems, causing data loss or causing problems with processor and memory systems. Computer trojans are another name for them.Discuss the many forms of computer software that are linked to computer viruses.arrow_forward
- Describe software theft. Consider types of software theft. Define software piracy. Define license agreement and single-user license agreement, or end-user license agreement (EULA). List the rights users have, and do not have, upon acceptance of a single-user license agreement. Explain why software piracy continues and why it is a serious offense. Note how software companies have responded to software piracy. Define product activation. Discuss ways that software costs can be reduced for organizations with large numbers of users. Point out the policies that many organizations have governing the use of software. How prevalent is software piracy?arrow_forwardA number of cybersecurity experts believe fingerprinting is a kind of abuse that exposes consumers' privacy concerns. Anti-browser fingerprinting technologies are included into several browsers. Provide an explanation of how each browser prevents fingerprinting.arrow_forwardOpen Source Software Sixty billion open source industry has a disproportionate impact on the trillion-dollar Information Technology market. Open source lowers the cost of computing by making it make accessible to smaller firms. It is more reliable and secure computing also lowers costs for all users. Open Source Systems reduces the cost of operating systems and databases so that companies can spend more money on product innovation or other more competitive initiatives. Oracle provides Linux for free and provides high-margin Linux support contracts for as much as five hundred thousand dollars. What is the additional benefit for Linux? IT is able to take over the customer from Microsoft—a firm that competes head-to-head with Oracle’s offerings. The bad news for Microsoft is that now all major hardware companies run Linux. This signifies a large, unified market that attracts software developers who might otherwise write for Windows. Indeed Linux operating system has captured a major share…arrow_forward
- Computer science What are some of the privacy issues that customers may have while buying on a social media platform like Facebook, which already has access to so much personal data?arrow_forwardSocial Engineering Reference Sheet Which of the following best describes: PHISHING? an act of pretending to be another person for the purpose of entertainment or deception. hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. to trick into believing or accepting as genuine something false and often preposterous Which of the following best describes: HOAXES? the fraudulent…arrow_forwardThe National Security Agency (NSA) works to detect and prevent threats to National Security Systems, which includes systems that handle classified information or are otherwise critical to military or intelligence activities. The NSA plays a vital role in our national security by providing America's leaders with critical information they need to defend our country, save lives, and advance U.S. goals and alliances globally. Tailored Access Operations (TAO) is a group of super hackers within the NSA that collects intelligence about foreign targets by breaking into their computers, stealing data, and monitoring communications. TAO is also responsible for developing programs that could destroy or damage foreign computers and networks via cyberattacks if commanded to do so by the president. What sort of personal characteristics would be important in selecting a candidate for the NSA super-secret Tailored Access Operations organization? What would be some of the pros and cons of such a…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning