Wednesday, March 23, 2011

PROTECTION AND SECURITY

Security

Security software is available in many forms. For users who intend to surf the Internet, antivirus software is the basic software should be owned. This antivirus software will scan every file sent and received from the internet to check the probability of a virus. Two major antivirus software suppliers are Norton and McAfee. both the supplier has a good reputation in the international market. To remain effective, antivirus software should be updated often because many viruses are created every day. The virus enters the operating system when it successfully invades undetected.

Protection

Addition of firewall system is a personal choice. This system will provide another layer of added protection when users on the Internet. Each program must obtain permission from the firewall to the computer to send and receive any information that comes from the Internet. Computer firewall can be modified, allowing users to allow any program that they can trust. For programs that do not know the origin, Firewall will block any action by any of these programs to seek permission from the user.

Protection and security concept.

Protection concepts

The aim of the concept of computer virus protection is to create suitable safeguards with which the occurrence of computer viruses in the IT systems of an organisation can be prevented or detected as early as possible. In this way, countermeasures can be taken and possible damage can be minimised. In the protection against computer viruses it is essential that the safeguards are consistently adhered to and that technical countermeasures are constantly updated. This requirement is due to the continual occurrence of new computer viruses or variants of viruses. The development of operating systems, programming languages and application software may also provide opportunities for computer viruses to attack. This should therefore be taken into account and suitable countermeasures should be taken.


Security concepts


Certain concepts recur throughout different fields of security:
Assurance - assurance is the level of guarantee that a security system will behave as expected
Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
Defense in depth - never rely on one single security measure alone
Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)
Risk - a risk is a possible event which could cause a loss
Threat - a threat is a method of triggering a risk event that is dangerous
Vulnerability - a weakness in a target that can potentially be exploited by a threat security


Security in computer system

• security is an enternal operating systems problem-providing controlled access to programs and data stored in the computer
• security is mainly focused on malicious behavior of entities external to the system,affecting computer assets:

 software.
ü

 data
ü
 Hardware
ü


Software mechanism
A compatibility mode is a software mechanism in which a computer's operating system emulates an older processor, operating system, and/or hardware platform in order to allow obsolete software to remain compatible with the computer's newer hardware or software.

Hardware mechanisms that protect computers and data

Hardware based or assisted computer security offers an alternative to software-only computer security. Devices such as dongles may be considered more secure due to the physical access required in order to be compromised.

Security Policy

A computer security policy defines the objectives and elements of computer system organization. This definition is very formal or regular informal. Security policy enforced by organizational policy or security mechanisms. A technical implementation of defining what a computer system is not secure or safe.


Elaborate authentic basic.

password

A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.


Artifact

In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).[1]

In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.

In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)


Biometric

Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Elaborate protection concept and access control.

• For your PC security suite is now available a variety of programsthat promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time.


• Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do notrequire excessive resources to the system.

• At the time all the leading manufacturers of security software suitethat provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system.

• The concept of security was also extended to the area where thismalware is not in the strict sense. But, in a sense, a proper backupdata fall within the concept of security
 
DOS ( DISK OPERATING SYSTEM )
Verview of Disk Operating System
  •   Disk operating system is one of the premier operating systems used in computer programming. The abbreviated form, DOS, is more popular among the computer users across the globe. The disk operating system is designed to offer all-round support to the secondary storage devices of computer system

  •  The main function of disk operating system is to coordinate the user and outside devices used in computer system. While operating a computer, user enters some commands. Disk operating system converts these commands into a version which is readable by computer memory. DOS also converts the error messages generated by computers into an understandable format.

  •  If the disk operating system is loaded out of a disk and employed in supporting disk related devices of computer, then it takes control of the whole operating system. FreeDOS, DOS/360 are some of the examples of disk operating systems, which serve the purpose of the overall operating system.
 
COMPUTER FILES IN DOS
A file may contain a program or any other kind of information. Generally, a file must be given a name that can be used to identify it.
DOS permits the user to assign a name consisting of two parts to a file - primary and secondary names.

No comments:

Post a Comment