What are some of the security problems related to improperly recycled equipment?
What will be an ideal response?
Because of the difficulty in disposing older computers, many organizations and individuals recycle older computers, wireless access points, and other equipment by giving them to schools or charities, or by selling them online.However, information that should have been deleted from the equipment often is still available. For example, data stored on hard drives may still be available on recycled computers. This is because with many operating systems, such as Microsoft Windows, simply deleting a file (and even emptying the Recycle Bin folder) does not necessarily make the information irretrievable. When that file is deleted, only the name is removed from the table; as more files are saved, the disk space that was used by the first file can be reclaimed and used for other files. Therefore, deleting a file means that the filename is removed from the table but the information itself remains on the hard drive until it is overwritten by new files. Data then can be retrieved from a hard drive by an attacker even after its files have been deleted. In addition, wireless access points may contain a password that is used for all APs across the network, or a computer may still have the WEP key installed.Attackers who can secure this information from recycled equipment can then use it to break into functioning WLANs.
You might also like to view...
Design a remote object table that can support distributed garbage collection as well as translating between local and remote object references. Give an example involving several remote objects and proxies at various sites to illustrate the use of the table. Show what happens when an invocation causes a new proxy to be created. Then show what happens when one of the proxies becomes unreachable
What will be an ideal response?
A control is a part of a form or report that you use to enter, edit, or display data
Indicate whether the statement is true or false
Create a simple text-editor GUI that allows the user to open a file. The GUI should display the text of the file and then close the file. The user can modify the file’s contents. When the user chooses to save the text, the modified contents should be written to the file, replacing any other con- tents. The user also should be able to clear the display.
What will be an ideal response?
Jane has private information about clients stored in the clipboard on a public computer. To ensure the client information remains private, she should do which of the
A) Close the active window. B) Paste all items in the clipboard. C) Clear all items from the clipboard. D) Close the clipboard pane.