sábado, 12 de septiembre de 2009

What are individual rights referring to computers?

  • Article 101. - A program for computing the original expression in any form, language or code, a set of instructions which, with a sequence, structure and specific organization, aims to make a computer or device performs a specific task or function.
  • Article 102. - Computer programs are protected on the same terms as literary works. Such protection extends to both operating programs to application programs, whether in object code form. Save those computer programs which seek to cause harm to other programs or computers.
  • Article 103. - Unless otherwise agreed in contract, economic rights in a computer program and its documentation, they have been created by one or more employees in the exercise of their duties as instructed by the employer, relate to this.
  • Article 104. - As an exception to the provisions of Article 27 paragraph IV, the owner of copyright in a computer program or database shall, even after the sale of copies thereof, the right to authorize or prohibit the letting of such copies. This provision does not apply where the copy of the software does not constitute in itself an essential object of the license.
  • Article 105. - The user of a computer program may make as many copies to authorize the license granted by the owner of the copyright, or a single copy of the program provided that:
    1. Is essential for the use of the program;
    2. Is intended exclusively as a backup to replace the legitimately acquired copy when it is not used for damage or loss. The backup must be destroyed when the user's end to use the computer program.

What are the most common ways to keep or maintain integrity of data?

  • Entity integrity concerns the concept of a primary key. Entity integrity is an integrity rule which states that every table must have a primary key and that the column or columns chosen to be the primary key should be unique and not null.

  • Referential integrity concerns the concept of a foreign key. The referential integrity rule states that any foreign key value can only be in one of two states. The usual state of affairs is that the foreign key value refers to a primary key value of some table in the database. Occasionally, and this will depend on the rules of the business, a foreign key value can be null. In this case we are explicitly saying that either there is no relationship between the objects represented in the database or that this relationship is unknown.

  • Domain integrity specifies that all columns in relational database must be declared upon a defined domain. The primary unit of data in the relational data model is the data item. Such data items are said to be non-decomposable or atomic. A domain is a set of values of the same type. Domains are therefore pools of values from which actual values appearing in the columns of a table are drawn.

http://en.wikipedia.org/wiki/Data_integrity#Types_of_integrity_constraints

What is a backup?


In information technology, backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. These additional copies are typically called "backups", and are useful primarily for two purposes:
  1. Restore a state following a disaster (called disaster recovery).

  2. Restore small numbers of files after they have been accidentally deleted or corrupted. Data loss is also very common. 66% of internet users have suffered from serious data loss.

http://en.wikipedia.org/wiki/Backup#References

What are encryption messages?

Encrypting a message protects the privacy of the message by converting it from plain, readable text into cipher (scrambled) text.
Only the recipient who has the private key (private key: The secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt (unlock) messages from recipients. Private keys should be password protected.) that matches the public key you used to encrypt the message can decipher the message. This is a separate process from digitally signing a message.

Which are the most common policies in virus detection?



  • Stay aware of current virus news by checking sites specialized for that.

  • Keep your anti-virus software up-to-date, and use it.

  • Make sure that your anti-virus software checks all files every time they're opened.

  • Don't open e-mail attachments that you didn't expect and don't know exactly what they are.

  • When downloading files from the Internet, download only from reputable sites and scan the files before executing them.

  • Be careful exchanging disks and files between computers. If you are taking a file to a computer lab for printing, write-protect the floppy disk.

  • If you use Microsoft Outlook (not Express) for e-mail, make sure that the "automatic preview" feature is disabled. You can find this option under the "View" menu.

  • Make sure that Microsoft Office macro virus protection is enabled.

  • Consider deinstalling Windows Scripting Host.

viernes, 11 de septiembre de 2009

What is a firewall?


A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.

Firewalls can be implemented in either hardware or software, or a combination of both, and are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Many users complain of certain firewalls conflicting with legitimate programs or generally not working. The Internet slang term for these is "cottonwall".

There are several types of firewall techniques:
  • Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
  • Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
  • Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
  • Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

What are the most common security procedures?

The most common procedures when applying security are:
  • Zipping the information or data.
  • Giving a security code to the computer, so that only close members can have access to the data contained.