1. Complete the review questions: a. A(n) ____________________ is a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
Surge
b. ____________________ occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.
Phishing
c. ____________________ is a fault-tolerance technique in which one device or component duplicates the activities of another.
Mirroring
d. ____________________ is a fault-tolerance technique that links multiple servers together to act as a single server.
Clustering
e. ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
Encryption
2. Security Breaches:
Security breaches being conducted by the employees at the Banana Tree Travel Agency consist of the way they keep their passwords written down on a piece of paper or a little sticky note to remember what it is. By doing this, they create a security breach, allowing other employees to view what their user name and password may be to their computer. Vital and important information are now at risk and in harm’s way by exposing your password to everyone within your environment. In some cases, customers come back to the work stations accompanied by other employees and if a dishonest customer see your information, the network could be accessed.
3. Security Checklist: * Employees should have strong passwords containing special characters * Install antispyware to all computers * Install antivirus software to all computers * Use a firewall on the network * Use web filtering software on the network “all computers” * Frequent checks of the security on the network should be conducted * Strong Administrative password
4. List three viruses and how they affect network security, integrity and availability: Virus | Security | Integrity | Availability |