Студопедия — Exposed to many
Студопедия Главная Случайная страница Обратная связь

Разделы: Автомобили Астрономия Биология География Дом и сад Другие языки Другое Информатика История Культура Литература Логика Математика Медицина Металлургия Механика Образование Охрана труда Педагогика Политика Право Психология Религия Риторика Социология Спорт Строительство Технология Туризм Физика Философия Финансы Химия Черчение Экология Экономика Электроника

Exposed to many






threats such as:

* Misuse

* Disorders

* Intended Corruption

Information Security is interested in the material components of the

computer so, we should do the following:

- We should devote a separate room for the computer with safety tools such

as fire extinguisher and a stabilizer for the electric current. We should select

the individuals who will deal with computers. The places chosen for

computers should have fresh air stream.

Data and information:

In using the computer, we should control the following:

* Data Entry

* The flow of Data

* Coding and encoding data

* The nature of the data available for each user.

(Software):

They are groups of orders that help us use the computer -

with the purpose of solving a problem or carrying out a task.

These programmes help the user in his work. They are the

(Operating System and application programmes).

Data and Information Security aims at keeping the programmes as they help

to:

……make sure that the programmes used are original.

…… control the areas of using the programme.

…….keep the secrets of data within the programmes.

(Computer Users)

The user is one of the primary elements we have to consider in the issue of

Data Security especially after the breakthrough in the scope of computer and

the wide spread of the internet and the nets. Data Security requires the

following:

- Defining the people who will scan data and deal with them.

- The nature of the data for each user.

Keeping Data and Information

There should be a complete awareness of the following - -

Data Processing concept.

The concept of the computer crimes.

- How to protect (The operating systems, the application programmes and

the Databases.

* We should be careful when we choose the people who will deal with the

computer data and information

The importance of Data and Information

To achieve a technological rise and development, we must consider Data

and information security as a must. So we have to define the concept of

Secuirty.

Using Original Programmes

To keep Data and processing them in a correct way in order to be

valuable information, we must deal only with original programme copies.

This is considered one of the elements that help us keep Data and

information Security. This gives the user the ability to deal with the

advanced facilities of the programme. You as a user, has the right to get

another copy if there is a problem in the original one. In this case, you will

avoid viruses and you will be away from being questioned by law.

These programmes will help the users achieve their important tasks.

These programmes are designed by computer experts who have the ability

of innovation. There should also be some restrictions in using these

programmes so as not to attack the Rights of designers. Hence, it is

important to know the extent of the danger in using the programmes that

are not orignal and are not authorized to copy.

Protecting the rights of the original programme designers

To gurantee a protection for the Rights of the programme designers,we have

to issue a law for protecting the Copyrights of the mental property. Penalty

should be defined and implemented.

-The law of protecting the rights of the programme designers.

Now, there is a law to protect the rights of the programme designers from

illegal users. The law puts conditions for dealing with the programmes for

example:

1- Defining an expiry date for the programme-

2- Preventing total or partial copying for the prtogramme without a written

permission from the programme designer.

3- Preventing the total or partial quoting without an official license from the

programme designer.

4- The personal user has the right to make a copy for home use only.

Deciding the penalty:

- If the data or the programmes are copied for the first time without an offical

permission, there will be a prison or a fine for those who are responsible for

Copyrights protection.

- If Data and information are copied many times without a permission there

will be prison and a fine.

Implmenting the penalty:

The Police for the artistic works will follow up all the sides to make sure

that the programmes used are the original and they carry out the penalty.

Remember

Data and Information Security:

The security primary aim is to keep the secrets of data, Information, the

used sets, the working individuals in an organization or an institution.

The elements to be protected:

1- The sets and accessories.

2- The data and information

3- The programmes

4- The users

Maintaining Data and Information:

-The concept of Data processing

- Computer Crimes.

The importance of Data and Information Security:

Information and Data Security is considered a must. To achieve a

technological rise, we must define the concept of security.

The Rights of the programme designers should be protected through

the following:

* There should be a law to protect the Copyrights for the mental

property.

* Penalty should be defined.

* Penalty should be implemented.

Questions

Fill in the spaces to form correct sentences:

1- Data and information security is to keep………………of

information, Data, the used sets, the individuals working in an

organization or an institution.

2- The elements to be protected are…………

3- Security concept means……………sources in correct

ways………….managing and organizing relationships and

communication inside………….without any effect on the ability of

the computer user.

4- There is a protection for the Copyrights of the programme

designers through………….

Viruses

Viruses

Viruses are the most dangerous things that threaten Data and corrupt

them. This danger can threaten also information and Data safety. This

worried computer users because this leads to the loss of important data. We

will know in this lesson what a Virus means.

Virus concept

The organic Virus

Viruses are the primary reason for man's infection with diseases. These

Viruses are able to move, spread, reproduce and may cause infection to

other persons.

The computer Virus

A little programme has the ability to reproduce and spread. It contains a

number of orders that destroy or delete the programmes or data found on the

computer.

- You may have one of these questions:

1- Why have we chosen the organic virus as a name for the computer virus?

2- What are the similarities between the organic and computer viruses?

To answer these questions, we notice the following two sets of comparisons:

The comparison Organic Viruses Computer Viruses
effect Changes the functions of the living cells Changes the functions of some programmes
Reproduction and spreading Reproduce to destroy other healthy cells Reproduces and makes other copies to infect a large number of programmes
Dormant Man can carry the virus without symptoms The computer may be infected by the virus but it is inactive

Causes for Virus appearance:

1- Protecting the original programmes from copying by illegal users.

2- For trade, as some companies started to produce anti-virus programmes.-

3- To make propaganda and to advertise for the mental property products.

4- The anti-virus programmes show the extent of the programme designer

intelligence.

Viruses Properties:

Virus has the following properties:

1- It is dormant. The virus may be existed but not active.

2- It reproduces. The virus is able to reproduce by making another a

copy for itself in the memory or in the files.

3- It can move. The virus moves from the corrupted files to other files.

4- It puts signs and marks the infected files.

5- It has the ability of executing. It can execute corrupting orders but

with conditions.

6- It has the ability of destruction to be able to cause corruption and disorder.

The places which the virus attacks:

The virus searches for the following files to corrupt:

(System Files)

(Executing Files)

(Files of Data)

Virus Symptoms:

1- The computer is unable to boot or load its operating system.

2- The computer shuts down without reason.

3- The increase or decrease in the size of files without a clear reason.

4- Some files are cancelled without reason.

5- False and unexpected messages are received.

6- Strange letters appeared on pressing the keyboard.

7- The appearance of some strange figures.

8- The computer slows down in a noticeable way.

Ways of carrying computer viruses:

All types of Storing Media are considered the primary causes for spreading

the viruses of computer.

- Hard disks, CDs and Flash Memory

Causes of viruses:

- Dealing with the internet

- Downloading files.

- Receiving e-mails.

Virus and ways of protection:

You can protect your computer from virus through the following:

* Take the necessary protections precautions.

Use anti-Virus programmes to scan your computer. **

Remove all viruses quickly

* Protection is better than cure in dealing with viruses.

Precautions for protection:

- Use original copies

- Make spare copies from the original programmes and data files.

- Protect the CDs through CDs holes.

- Watch out the file sizes from now and then.

- Watch out the executive files.

- Use anti-virus programmes to scan your computer to detect and remove

the viruses.

Scan Virus programmes:

Anti –Virus programmes are used to scan the computer (Programmes, data

files and the stored media available on the set). These programmes have the

ability to detect viruses if they are found.

Notice







Дата добавления: 2015-09-06; просмотров: 404. Нарушение авторских прав; Мы поможем в написании вашей работы!



Шрифт зодчего Шрифт зодчего состоит из прописных (заглавных), строчных букв и цифр...

Картограммы и картодиаграммы Картограммы и картодиаграммы применяются для изображения географической характеристики изучаемых явлений...

Практические расчеты на срез и смятие При изучении темы обратите внимание на основные расчетные предпосылки и условности расчета...

Функция спроса населения на данный товар Функция спроса населения на данный товар: Qd=7-Р. Функция предложения: Qs= -5+2Р,где...

Сосудистый шов (ручной Карреля, механический шов). Операции при ранениях крупных сосудов 1912 г., Каррель – впервые предложил методику сосудистого шва. Сосудистый шов применяется для восстановления магистрального кровотока при лечении...

Трамадол (Маброн, Плазадол, Трамал, Трамалин) Групповая принадлежность · Наркотический анальгетик со смешанным механизмом действия, агонист опиоидных рецепторов...

Мелоксикам (Мовалис) Групповая принадлежность · Нестероидное противовоспалительное средство, преимущественно селективный обратимый ингибитор циклооксигеназы (ЦОГ-2)...

Этапы трансляции и их характеристика Трансляция (от лат. translatio — перевод) — процесс синтеза белка из аминокислот на матрице информационной (матричной) РНК (иРНК...

Условия, необходимые для появления жизни История жизни и история Земли неотделимы друг от друга, так как именно в процессах развития нашей планеты как космического тела закладывались определенные физические и химические условия, необходимые для появления и развития жизни...

Метод архитекторов Этот метод является наиболее часто используемым и может применяться в трех модификациях: способ с двумя точками схода, способ с одной точкой схода, способ вертикальной плоскости и опущенного плана...

Studopedia.info - Студопедия - 2014-2024 год . (0.01 сек.) русская версия | украинская версия