Give definition to information security

Information security, information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction is the prevention of experience.

Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerianhexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.

Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).

 

Give definition to Computer viruses  

The computer virus is the small program written by the programmer of high qualification, capable to self-reproduction and performance of different destructive actions. For today it is known over 50 thousand computer viruses.

A computer virus is a malicious program, which is transmitted from one computer to another, usually over a networks.

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless.

Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments.

Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.

Types of computer viruses: Resident viruses, Overwrite viruses, Direct action viruses

Best Antivirus Programs: NOD32; Kaspersky; Norton; Avast; Eset, and etc.

Describe Web technologies

The World Wide Web provides a new paradigm in computer networking for human communication which had an impact on the delivery of information and continues to stand in rapid developments.

Important trends used to develop new Web Technology and services such as Ubiquity, Dynamic content, Reliance on open standards and open source. The word Web Technology represents a discontinuity in the way applications are connected. Using the Web Technology as the basis for an application brings substantial advantages to the adopter.

This paper focuses on 2 tier architecture and mainly on the 3 tier architecture which is the present web technology. This paper will also review the client-side scripting and the server-side scripting.

       Web technology is the establishment and use of mechanisms that make it possible for different computers to communicate and share resources. Web technologies are infrastructural building blocks of any effective computer network: Local Area Network (LAN), Metroplitan Area Network (MAN) or a Wide Area Network (WAN), such as the Internet. Communication on a computer could never be as effective as they are without the plethora of web technologies in existence.

Describe Cloud computing

«Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction».

Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network typically the internet.

Web services of cloud technology: mail, google, etc

Cloud types: public, private, hybrid, community cloud

 

Give definition to Main terms of Smart technology

Smart systems incorporate functions of sensing, actuation, and control in order to describe and analyze a situation, and make decisions based on the available data in a predictive or adaptive manner, thereby performing smart actions. In most cases the “smartness” of the system can be attributed to autonomous operation based on closed loop control, energy efficiency, and networking capabilities.

A lot of smart systems evolved from micro systems. They combine technologies and components from Microsystems technology (miniaturized electric, mechanical, optical, and fluidic devices) with other disciplines like biology, chemistry, nano science, or cognitive sciences.


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: