Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 4IR
Explanation of Solution
Java security flaws from two articles:
- As java in browser is
Operating System (OS) independent and it has the popular run-time environment in desktop browsers, java becomes more attractive target for malicious attacker. - Oracle is decided to move rapidly to fix the java flaws.
- In 2013, Oracle released a critical one-off path update to fix the issue before two weeks of the issue being actively exploited...
Explanation of Solution
Processes of informing users about the need to obtain updates to fix security holes:
- A Critical Patch Update
program is a group of patches for various security vulnerabilities where patches are a set of changes such as update, and fixing the data to a computer system. - Oracle informs the users that they need to be remains in actively supported version and apply for the Critical Patch Update program.
- Critical Patch Update program releases the patches for the product versions covered by premier support or extended support of Lifetime Support Policy...
Explanation of Solution
In the world, there are 5 to 10 billion devices have java installed.
Devices that have java installed:
- In the world, 1.1 billion desktop systems run java...
Explanation of Solution
Ways to identify whether java is installed on a computer
- If the user uses command prompt to identify the installation of java.
- After installing java, the user needs to set “PATH” variable in environmental variables.
- Then, the user types the command “java –version” in terminal.
- After running the above command, if java is installed on a computer then it shows the version of java, java Standard Edition (SE) Environment’s build and Java HotSpot client Virtual Machine’s (VM) build.
- The user can also use program that reads java system properties to identify whether it is installed or not...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Java - Password Modifier
Operating systems and the vast majority of other forms of software include bugs when they are originally released. Existing software contains tens of thousands of errors, sometimes known as bugs. By providing updates, software companies consistently address recognized issues with published software (also known as patches). The day after the public disclosure of a new vulnerability, hackers and other criminals often conduct zero-day attacks to exploit it. No one can disagree that these criminals' activities are immoral, but what obligation does a software company have if their ignorance or hurry to market harms customers? What responsibility do computer users have regarding the installation of security updates?
Several experts in the field of cybersecurity argue that fingerprinting is unethical and infringes consumers' privacy concerns.
Several browsers have devised techniques to prevent leaving a browser fingerprint.
Browsers have tried a number of strategies to defend themselves from fingerprint recognition.
Chapter 12 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 12 - Prob. 1SGCh. 12 - Prob. 2SGCh. 12 - Prob. 3SGCh. 12 - Prob. 4SGCh. 12 - Prob. 5SGCh. 12 - Prob. 6SGCh. 12 - Prob. 7SGCh. 12 - Prob. 8SGCh. 12 - Prob. 9SGCh. 12 - Prob. 10SG
Ch. 12 - Prob. 11SGCh. 12 - Prob. 12SGCh. 12 - Prob. 13SGCh. 12 - Prob. 14SGCh. 12 - Prob. 15SGCh. 12 - Prob. 16SGCh. 12 - Prob. 17SGCh. 12 - Prob. 18SGCh. 12 - Prob. 19SGCh. 12 - Prob. 20SGCh. 12 - Prob. 21SGCh. 12 - Prob. 22SGCh. 12 - Prob. 23SGCh. 12 - Prob. 24SGCh. 12 - Prob. 25SGCh. 12 - Prob. 26SGCh. 12 - Prob. 27SGCh. 12 - Prob. 28SGCh. 12 - Prob. 29SGCh. 12 - Prob. 30SGCh. 12 - Prob. 31SGCh. 12 - Prob. 32SGCh. 12 - Prob. 33SGCh. 12 - Prob. 34SGCh. 12 - Prob. 35SGCh. 12 - Prob. 36SGCh. 12 - Prob. 37SGCh. 12 - Prob. 38SGCh. 12 - Prob. 39SGCh. 12 - Prob. 40SGCh. 12 - Prob. 41SGCh. 12 - Prob. 42SGCh. 12 - Prob. 43SGCh. 12 - Prob. 44SGCh. 12 - Prob. 45SGCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - Prob. 3TFCh. 12 - Prob. 4TFCh. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 8TFCh. 12 - Prob. 9TFCh. 12 - Prob. 10TFCh. 12 - Prob. 11TFCh. 12 - Prob. 12TFCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - Prob. 3MCCh. 12 - A(n) _____ report consolidates data usually with...Ch. 12 - Prob. 5MCCh. 12 - Prob. 6MCCh. 12 - Prob. 7MCCh. 12 - Prob. 8MCCh. 12 - Prob. 1MCh. 12 - Prob. 2MCh. 12 - Prob. 3MCh. 12 - Prob. 4MCh. 12 - Prob. 5MCh. 12 - Prob. 6MCh. 12 - Prob. 7MCh. 12 - Prob. 8MCh. 12 - Prob. 9MCh. 12 - Prob. 10MCh. 12 - Prob. 2CTCh. 12 - Prob. 3CTCh. 12 - Prob. 4CTCh. 12 - Prob. 5CTCh. 12 - Prob. 6CTCh. 12 - Prob. 7CTCh. 12 - Prob. 8CTCh. 12 - Prob. 9CTCh. 12 - Prob. 10CTCh. 12 - Prob. 11CTCh. 12 - Prob. 12CTCh. 12 - Prob. 13CTCh. 12 - Prob. 14CTCh. 12 - Prob. 15CTCh. 12 - Prob. 16CTCh. 12 - Prob. 17CTCh. 12 - Prob. 18CTCh. 12 - Prob. 19CTCh. 12 - Prob. 20CTCh. 12 - Prob. 21CTCh. 12 - Prob. 22CTCh. 12 - Prob. 23CTCh. 12 - Prob. 24CTCh. 12 - Prob. 25CTCh. 12 - Prob. 26CTCh. 12 - Prob. 27CTCh. 12 - Prob. 28CTCh. 12 - Prob. 29CTCh. 12 - Prob. 1PSCh. 12 - Prob. 2PSCh. 12 - Prob. 3PSCh. 12 - Prob. 4PSCh. 12 - Prob. 5PSCh. 12 - Prob. 6PSCh. 12 - Prob. 7PSCh. 12 - Prob. 8PSCh. 12 - Prob. 9PSCh. 12 - Prob. 10PSCh. 12 - Prob. 11PSCh. 12 - Prob. 1.1ECh. 12 - Prob. 1.2ECh. 12 - Prob. 1.3ECh. 12 - Prob. 2.1ECh. 12 - Prob. 2.2ECh. 12 - Prob. 3.1ECh. 12 - Prob. 3.2ECh. 12 - Prob. 1IRCh. 12 - Prob. 2IRCh. 12 - Prob. 4IRCh. 12 - Prob. 5IRCh. 12 - Prob. 1CTQCh. 12 - Prob. 3CTQCh. 12 - Prob. 4CTQ
Knowledge Booster
Similar questions
- Several professionals in the field of cybersecurity believe that fingerprinting is unethical and that it violates the privacy concerns of users. A number of browsers have developed methods to avoid leaving a browser fingerprint. Browsers have made many attempts to defend themselves against fingerprint recognition using a variety of methods.arrow_forwardIdentify the actions to take in order to mitigate Java and Javascript vulnerabilities.arrow_forwardOperating systems and the vast majority of programmes do not begin their lives devoid of bugs. Applications have tens of thousands of bugs in them at any one time. It is common practise for software suppliers to give fixes for recognised software defects (also known as patches). Criminals often launch zero-day attacks the day after a newly discovered vulnerability is disclosed to the public. Nobody can dispute the immorality of what these criminals are doing, but a software firm has what duty to its customers if their inexperience or haste to compete in the market causes them harm? Users of computers are required to install the latest security updates.arrow_forward
- true or false 2. More than 50 year ago, security was accomplished by using physical controls over access to the computers.arrow_forwardMost software, including operating systems, is not error free when it is first released. Some programs, in fact, contain thousands of problems, called bugs. Software companies regularly release fixes (called patches) to correct known issues with released software. Many hackers and other criminals target these bugs with computer viruses or other attacks, frequently on the day a new vulnerability is announced—called a zero-day attack. Obviously, the acts by these criminals are not ethical, but what responsibility does a software company have to consumers if they are put at risk due to the company’s carelessness or rush to market? What responsibility do consumers have to make sure they keep their computers patched against new vulnerabilities?arrow_forwardAntivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.Comprehensive virus protection programs help protect your files and hardware from malware such as worms, Trojan horses and spyware, and may also offer additional protection such as customizable firewalls and website blocking. On same background explain how does an Antivirus system in a computer function.arrow_forward
- Intellectual property is a controversial subject in some circles. Considering the amount of effort needed to produce a creative work, such as a movie or a book, and the ease with which digital media allow such things to be duplicated and transmitted for little to practically no cost, an entire industry has been built up around copy protection. One copy piece of copy protection software interfered with the functioning of a computer’s CD/DVD writer, slowing it down significantly and in many cases preventing it from working. The copy protection software producer felt that the measure was justified, claiming that DVD writers were only used to produce illegal copies of commercial works. Discuss with your classmates the technical and ethical challenges in protecting intellectual property in the digital age.arrow_forwardDo Trojan horses take viruses or worms with them when they are ridden?arrow_forwardComputer viruses are malicious software programs that may erase data or wreak havoc on a computer's processing and memory components and are notoriously difficult to detect. They are sometimes referred to as computer trojans.Computer viruses have been connected to a wide variety of software, therefore let's talk about it.arrow_forward
- Identify the signs of a virus infection. How are a computer virus, a worm, and a Trojan horse similar? How are they different? Define malware (or malicious software). Define payload. List symptoms of a computer infected by a virus, worm, or Trojan horse. Mention the four ways in which viruses deliver their payloads. How can a virus can spread through an e-mail message? Explain why malicious-logic programs are a serious problem. How long is an unprotected computer safe from intruders?arrow_forwardWhat does it mean for extensions, plug-ins, and add-ons to pose a security risk?arrow_forwardIs it possible to negate access control by taking particular steps?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning