Monday, February 17, 2020

Secure Computer System Essay Example | Topics and Well Written Essays - 750 words

Secure Computer System - Essay Example Firewalls are the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium scale to large scale enterprise (Pickering, 2009). DMZ has two (2) disadvantages: First, the firewall can be created to pass trusted'' services within the application gateway(s), thus, subverting the policy. The trusted'' services which get passed all around the application gateway typically end up being in contact with the site systems. Another disadvantage is placed on the routers for the provision of security. Packet filtering routers seemed complex to configure and errors could disclose the whole site to security holes (Wack, 2009). Added by Pickering (2003), the application proxy firewalls usually require frequent software updating to run the latest versions of the proxy code. This is important particularly when new exploits are detected, needs to be blocked, and in the event when problems emerge interactions between the proxy as well as widely deployed applications. Meaning, when the proxy is found actually breaking. 3. Using a Microsoft XP or 2000 system, open Internet Explorer. Open Internet Options under the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering, and b) protection from unwanted items like cookies Some actions that Microsoft XP or 2000 system allow a user to do in order to configure content, filtering, and protection from unwanted items like cookies are: 1. To personalize Windows XP settings for each user; and also 2. To assign user to create accounts and passwords in the computer to control the users who can access on the system. In other words, users who are not the "administrators" will have no access, unable to change critical system files or delete it. The system may also be upgraded by logging off from a regular user account, then, logging back in as

Monday, February 3, 2020

Delchi Carrier, SpA v. Rotorex Corp Case Study Example | Topics and Well Written Essays - 500 words

Delchi Carrier, SpA v. Rotorex Corp - Case Study Example The lower court, through Judge Munson who replaced Judge Cholakis, granted Delchi's motion for partial summary judgment, holding Rotorex liable to Delchi for $1,248.331.81 as consequential damages mainly for the lost of profits. The lower court denied Delchi's claim for damages for incidental and inconsequential damages or out-of-pocket expenses. On appeal to the United States Court of Appeals (USCA), Rotorex argued that it did not breach the agreement, Delchi is not entitled to payment of lost profits, and the calculation of the number of lost sale is improper. Delchi, on the other hand, filed a cross-appeal to the USCA claiming that it is entitled to payment of the additional expenses it incurred because of the breach. Article 35 of the CISG, which is the applicable law in this case, provides that "the seller must deliver goods which are of quantity, quality and description required by the contract; the goods do not conform with the contract unless they possess the qualities of goods which the seller has held out to the buyer". The United States Court of Appeals affirmed the decision of the lower court holding Rotorex liable for breach of contract.