Goodreads helps you follow your favorite authors. Be the first to learn about new releases!
Start by following Peter H. Gregory.
Showing 1-30 of 45
“virus writers lack the basic social and moral values and the “well-formed consciousness” that are the hallmarks of civilized modern societies.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“It’s usually a good idea to restart the computer after changing the registry, as many changes do not take effect until restarting the computer.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“Check, double-check, and triple-check that you’re deleting the correct branch! This is very dangerous
territory!”
― Computer Viruses For Dummies
territory!”
― Computer Viruses For Dummies
“if there’s any software you need to be comfortable with, it’s your antivirus software. It’s a lot like automobile tires or insurance: Reliability and performance are not optional”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“The antivirus program will not wake up your computer if it isn’t running — but if it’s already running, then it doesn’t need to be awakened.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“If the virus that infected your computer deleted one or more of your files, and you don’t have copies of those files elsewhere, they may be irretrievably gone”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“The people who wrote viruses knew they had to stay one step ahead; they developed ways to make their viruses more difficult to detect.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“Virus writers are, sociologically, not much different from taggers who spray cryptic symbols on walls, or even the “unofficial” graffiti artists: they feel (or say they feel) justified in doing their work, and have a wanton disregard for the dignity and property of others. They feel not mere justification, but pride in what they do.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“the older versions of Windows that —rumor has it — are equipped with the fabled “time to crash!” feature.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“It’s more important to install your antivirus software correctly than quickly”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“Three or four countries do have state-sponsored hackers. I shouldn’t name these countries by name, but many of them are known to be hostile to the United States in other ways. Some of these same countries sponsor hackers in order to give us a little trouble.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“A “better” biological virus — like a computer virus — will perhaps just make its host sick, but still well enough to keep spreading the virus”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“data files aren’t executable, and viruses have to be executed. It’s safest to say that viruses hide only in executable program files.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“The Registry is a special database in the computer that contains a multitude (literally thousands) of configuration settings used by Windows and many of the programs installed on the computer”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“No legitimate corporations will ask you to send them sensitive information via e-mail.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“Viruses don’t just happen; people write them deliberately.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“Buying antivirus software is like buying insurance: It’s important to make a good choice now just in case you need the assistance later.”
― Computer Viruses For Dummies
― Computer Viruses For Dummies
“Be careful, and go slowly. Computers are intolerant of mistakes;
they do just what you tell them to do, not what you
meant for them to do.”
― Computer Viruses For Dummies
they do just what you tell them to do, not what you
meant for them to do.”
― Computer Viruses For Dummies
“Understanding and changing aspects of an organization’s culture is one of the most important success factors in an organization and also one of the most difficult.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“Personnel are the primary weak point in information security.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“Why test a DR plan? Disaster recovery plans contain lists of procedures and other information that an emergency response team follows when a natural or man-made disaster occurs. The purpose of the plan is to recover the IT systems and infrastructure that support business processes critical to the organization’s survival. Because disasters don’t occur very often, you seldom can clearly tell whether those DR plans will actually work. And given the nature of disasters, if your DR plan fails, the organization may not survive the disaster. Testing is a natural part of the lifecycle for many technology development efforts today: software, processes, and — yes — disaster recovery planning. Figure 10-1 depicts the DR plan lifecycle. Figure 10-1: The DR plan lifecycle. When you test the DR plan, note any discrepancies, and then pass the plan back to the people who wrote each section so they can update it. This process improves the quality and accuracy of the DR plan, which increases the likelihood that the organization will actually survive a disaster if one occurs. Another great benefit of DR plans and their tests is the likelihood that, by undertaking them, you can improve the organization’s everyday processes and systems. When teams closely scrutinize processes and figure out how they can protect and recover those processes, often the team members discover opportunities for improvement. Sometimes the question, “How can we recover this system?” gives people the opportunity to answer the question, “How can we improve the existing system?” Be open to those opportunities because they’ll come, sometimes in droves. The types of testing that I discuss in this chapter are Paper tests Walkthrough tests Simulations Parallel tests Cutover tests These tests range from the simple review of DR procedure documents to simulations to running through procedures as if you’re experiencing the real thing. Developing a test strategy DR testing in all its forms takes considerable effort and time. To make the best possible use of staff and other resources, map out a test strategy well in advance of any scheduled tests. Structure DR testing in the same way you structure other complicated undertakings, such as software development and associated testing. Just follow these steps: 1. Determine how frequently you should perform each type of test. 2. Test individual components. 3. Perform wider tests of combined components. 4. Test the entire plan. When you perform DR testing as outlined in the preceding list, you can identify many errors during individual tests and correct those errors before you do more comprehensive tests. This process saves time by preventing little errors from interrupting comprehensive tests that involve a lot of people. Virtually every enterprise that builds actual products performs testing as outlined in the preceding list. Businesses have found this test methodology to be the most effective way to ensure success in a reasonable timeframe. Figure 10-2 shows the flow of DR testing.”
― IT Disaster Recovery Planning For Dummies®
― IT Disaster Recovery Planning For Dummies®
“The Cable of Fear”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“The best solution for these “unknown unknowns” is to have an external, competent firm perform an organization’s risk assessment every few years or for such an organization to thoroughly examine an organization’s risk assessment for the purpose of discovering opportunities for improvement, including expanding the span of threats, threat actors, and vulnerabilities so that there are fewer or no unknown risks.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“Netflow This is a network anomaly detection protocol developed by Cisco Systems and is available on Cisco Systems routers.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“An activity review is a corrective control that helps reduce accumulation of privileges.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“A digital signature is a cryptographic operation where a sender “seals” a message or file using her identity.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“It is said that a roof is best repaired on a sunny day.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“ultimate responsibility or ownership for protecting information is at the executive leadership and board of directors level.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“Original Risk – Mitigated Risk – Transferred Risk = Residual Risk”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“An audit generally requires the presentation of evidence of control design and effectiveness, where a review often does not.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide





