You are on page 1of 5

CHAPTER 5

1. Suppose that you wanted to set up a media server in your home for wireless
streaming to any other computer or mobile device. How would you go about
doing this? What sort of hardware would you purchase? Is a Windows
HomeGroup required?

Ans: connect a PC to your TV, these provide convenient interfaces across all your
devices. That means apps for TV streaming boxes, smartphones, tablets, and web-based
interfaces for everything else. They even work over the Internet. perhaps videos ripped
from DVDs and music ripped from audio CDs — this may be the ideal way to access that
content on all your devices without relying on streaming services like Netflix and Spotify.
Plex and Media Browser both offer servers that run on Windows, Linux, Mac OS X,
BSD, and various NAS devices. You can install it on a desktop computer, a dedicated
server, or get a pre-made NAS device that supports the server software. Hardware
includes TV-streaming boxes, smartphones, and tablets. Use them to access your
streaming media an yes Home group is required.

2. Compare the cloud-based office automation systems of Microsoft and Google.


What are some of their benefits? Which would you choose if you were a business?
Defend your answers.

Ans: From 1990s Microsoft was one of the important office suit to work. The vast
majority of businesses still run on Office. Microsoft and Google agree that cloud-based
suites involve browser-based apps and hosted services that replace local software and
servers, and they both charge a monthly per-user fee-as little as $6 for Office 365 and $5
for Google Apps. (Apps even has a free edition, good for up to 10 users.) But the two
suites are strikingly different, and they reflect the biases of the companies that created
them. As with many a Microsoft product before it, Office 365 is difficult to describe
concisely. What it isn’t is the fully Web-based version of Microsoft Office that you might
expect. Yes, there are online versions of Word, Excel, OneNote, and PowerPoint, which
Microsoft calls the Office Web Apps. Conceptually, Google Apps is far simpler than
Office 365. Google has no desktop software business to defend, so it puts everything in
the cloud: word processing, spreadsheets, presentations, email, documents, and all the
server software you might otherwise need to wrangle them. Its Web-based productivity
programs aren’t anywhere near as powerful as Microsoft’s desktop versions of Office, but
they’re far more mature than the Office Web Apps, with fewer notable missing features.
(The collaborative tools are particularly well-done.) And the Google Apps Marketplace
offers a bevy of business tools that integrate with Google’s offerings-accounting, CRM,
email marketing managers, and much more. I’m still waiting for the cloud-based suite of
my fantasies. It would provide most of the power of conventional Microsoft Office
without making you install anything. It would work with or without an Internet
connection.
3. Explore the use of expert systems in the health-care industry. Provide at least two
examples of how they are used and the benefits they offer.

The large, enormously complex expert systems (ES) such as MYCIN, ONCOCIN, and
INTERNIST raised the expectations of many that artificial intelligence (AI) technology
would have a significant impact on the everyday practice of medicine. A rather eclectic
literature search reveals that while hundreds of applied expert systems have been
prototyped, these have not led to a groundswell of interest among either practicing
physicians or healthcare administrators. To account for this apparent failure of expert
systems to deliver on their promised capabilities, three key factors are explored: physician
disinterest' the low priority assigned to Al among healthcare information systems
executives; and the relatively new competitive market pressures affecting health services
delivery. A domain of the healthcare industry where ES and knowledge-based technology
has taken hold, i.e. the managed care/utilization review arena, is described. This new
application of ES technology has the potential to influence standards of medical practice
through “medical necessity criteria” embedded in the knowledge base, and to disseminate
key findings from research on medical treatment outcomes. Ethical and legal issues
surrounding the appropriate use of this technology remain as yet untested and unresolved

4. Consider the data mining practices of search engines, social networking sites, and
retailers. Do you agree with the way they gather, use, and share data? Why or
why not?

he potential of data mining as a technique that could be used by malicious data miners to
threaten the privacy of social network sites (SNS) users. It applies a data mining
algorithm to a real dataset to provide empirically-based evidence of the ease with which
characteristics about the SNS users can be discovered and used in a way that could invade
their privacy. One major contribution is the use of the decision forest data mining
algorithm (SysFor) to the context of SNS, which does not only build a decision tree but
rather a forest allowing the exploration of more logic rules from a dataset, for example,
revealed that anyone having a profile picture showing just the face or a picture showing a
family is less likely to be lonely. Another contribution is the discussion of the
implications of the data mining problem for governments, businesses, developers and the
SNS users themselves.

Proper use of privacy setting can save you from any victim of stalking, harassment or
domestic violence.

5. Go to the configuration screen of your wireless router. What settings does it offer
that help maximize security? Provide at least three examples. If you do not own a
wireless router, find this information for any wireless router of your choosing.
Wireless router offers the unique username and password, which can be change and useful
in maximizing the security. Limited access of password. you shouldn’t feel obliged to
give out the password to everyone that enters your home. And changing password
frequently option is more convenient for everyone. Changing the admin or username is
also very useful in maximizing the security . router manufacturers produce the same
settings for every item of a product line that they produce. Often, a manufacturer will
install the exact same administration software on all of its router models. That consistency
makes life easy for hackers. Change the SSID so that it doesn’t give away the router brand
or model. Don’t choose an identifier that includes your name, address, or telephone
number.

6. Suppose that a website requires an eight-character password of your choosing.


Provide at least three examples of weak passwords along with three examples of
strong passwords. Explain the reasoning or evidence for your examples..

Weak Password:

1- A common example is using a last name + year of birth combination. Marshall1968 -


though this example uses 12 characters and includes letters and numbers, it includes
both a name that can be associated with you or your family, and other identifying
pieces of information such as your birth year, which means it can be easily hacked.
2- Let’s say you use “F1avoR” as a password, mixing up capital letters and numbers.
Here are two important reasons why this password example isn’t safe:
3- The number of substitutions can be easily guessed. Substituting the number 1 for the
letter l is easy to guess for both humans and software.

Strong Password:

Don’t reuse your passwords: If you’re using the same password across email, shopping,
and other websites holding sensitive personal data (or even a local community website)
and one of those experiences a breach, you’ve now exposed the other services to the risk
of being breached as well.

Don’t write your passwords down: In can be tempting, especially in the workplace, to
keep track of passwords f the old-fashioned way, but these are easily discovered.

Use a password manager: There are many apps that store your passwords securely.
Webroot SecureAnywhere® Internet Security Plus and Webroot SecureAnywhere®
Complete offer a password manager as an additional online security tool.

7. Evaluate the strengths and weakness of the following authentication categories:


passwords, access cards, and biometrics. Then consider which one(s) you would
use if you were in charge of security at a medium-size office with approximately
150 employees.

Password

When using passwords, it’s important to use strong passwords. A strong password has a
mixture of upper case, lower case, numbers, and special characters. In the past, security
professionals recommended that passwords should be at least eight characters long.
However, with the increasing strength of password crackers, it’s common to hear
professionals recommending longer passwords. For example, many organizations require
that administrator passwords be at least 15 characters long.

Longer passwords are harder to remember unless they’re put into some type of
meaningful order. For example, a phrase like “Security breeds success” can become a
password of “S3curityBr33d$Succ3$$”.

Passwords should not include personal data like a user’s name or username. A dictionary
attack uses a database of words similar to a dictionary, trying all the words in the database
for a match. It’s worth stating the obvious here[md]attackers have access to dictionaries in
other languages. In other words, a password using a word from another language is as
simple to crack as a password used in your native language.

Access Card:

A token is a hand-held device with an LED that displays a number and the number is
synchronized with an authentication server., which shows the authentication server and
the user with a hand-held token. The number displayed on the token changes regularly,
such as every 60 seconds, and the authentication server always knows the currently
displayed number.

For example, at 5:01 PM, the number displayed on the LED may be 963147, and at the
same time, the server knows that the number is 963147. A minute later, the number
displayed in the LED may be 246813 and the authentication server would know this new
number.

A common way that tokens are used for authentication is with websites. The user types in
the number displayed in the token on a web page. If the user types in the same number
known by the server at that time, the user is authenticated. It’s common to use multifactor
authentication with token-based authentication. In addition to entering the number
displayed in the token, the user is often required to enter a username and password. This
proves they have something (the token), and they know something (their password)

Biometric:
While biometrics does provide the strongest authentication, it is susceptible to errors. A
false rejection error (also called type 1 error) occurs when a system falsely rejects a
known user and indicates the user is not known. A false acceptance error (also called a
type 2 error) occurs when a system falsely identifies an unknown user as a known user.
Biometric systems typically can be adjusted for sensitivity, but the sensitivity affects the
accuracy.

the FAR and FRR of a biometric system. Notice that the false accept rate (FAR) decreases
as the sensitivity increases. In other words, a less sensitive system falsely authenticates
unknown users. In contrast, the false reject rate increases as the sensitivity increases -
more known users are rejected as unknown.

The point where the FRR and FAR crosses is known as the crossover error rate (CER).
You can compare the CERs of different biometric systems to determine how accurate they
are. A lower CER indicates that the biometric system has a higher accuracy.

I will use Biometric, As No one can use your fingerprints, and face to enter, It will be
more authentic way for security.

8. Name two reliable news sources or labs that test many of the anti-malware
products on the market. What sort of tests do they run? Which paid and free
products received the highest scores this year? Based on this research, which
anti-malware utility would you install on your system? Defend your answer.

Norton, McAfee and AVG - more than 80 antivirus and security suites have been
reviewed and re-reviewed], as of April 2019, to give the very best solution to protect
and secure your devices. Bitdefender Antivirus Plus 2019 is the best and higher
scorer of the year and I will use this antivirus due to their standout features:
Ransomware protection and remediation, privacy tools, VPN, Safepay.

You might also like