Joshua Kellogg
8/9/05
Chapter 10 Homework Exercises
1. The need for security in the computing enviorment arises because of confidentaility, integrity, and availabillity. Physical and software security needs to be ensured also.
2. the different types of security measures for a computer are, a firewall which permits only trusted data through what they call a choke point, but it does not guarantee portection from outside attacks. (IDS) or Intrusion Detection System are third party tools that detect patterns that are suspicious looking. Access Control gives you the right to grant privliges to certian people to access a computer.
10. A virus is a small piece of code embedded in a larger, legitimate program. Any virus is designed to run first when the legitimate program gets executed. The virus loads itself into memory and looks around to see if it can find any other programs on the disk. If it can find one, it modifies it to add the virus's code to the unsuspecting program. Then the virus launches the "real program." The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time either of those programs gets executed, they infect other programs, and the cycle continues.