→ ♥

A capacity and taste for reading gives access to whatever has already been discovered by others.

- Abraham Lincoln



Miyerkules, Agosto 10, 2011

♥ FIREWALL ♥

| | 0 (mga) komento

IMAGE CREDIT /" GOOGLE"


firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions. 
Read more...

♥ ACCESS CONTROL SOFTWARE ♥

| | 0 (mga) komento

IMAGE CREDIT/ "GOOGLE"

Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.



ADVANTAGES

  •  Electronic Keys are Difficult to Duplicate
  • You NEVER Have to Change the Locks
  • You Only Have to Remember One Key







Read more...

♥ ENCRYPTION ♥

| | 0 (mga) komento

IMAGE CREDIT/ "GOOGLE"

     In cryptography, encryption is the process of transforming information  using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information . In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

ADVANTAGES

  • the encryption process is simple
  • each trading partner can use the same publicly known encryption algorithm - no need to develop and exchange secret algorithms
  • security is dependent on the length of the key


Read more...

♥ BIOMETRIC ♥

| | 0 (mga) komento


IMAGE CREDIT/ "GOOGLE"


Biometrics (or biometric authentication) consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.


ADVANTAGES
  • Increase security - Provide a convenient and low-cost additional tier of security.
  •  Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy     punching. 
  •  Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. 
  • Reduce password administration costs. 
  •  Replace hard-to-remember passwords which may be shared or observed. 
  •  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! 
  • Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. 
  • Unequivocally link an individual to a transaction or event.



DISADVANTAGES
  • The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
  • It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time
  • For people affected with diabetes, the eyes get affected resulting in differences.
  • Biometrics is an expensive security solution.

Read more...

Linggo, Hunyo 19, 2011

♥Laws, Ethics & Computer Technology

| | 3 (mga) komento

--> ETHICS
DEFINITION:
                     Also known as moral philosophy,. Ethics is a branch of philosophy. Dealing with what is the proper of action for people. By answering the question, "What do I do?" It is also the study of right and wrong in human behaviors.  


IMPORTANCE OF ETHICS :
                      Ethics is one of a requirement in human life. It is our means of deciding what course of action we will do. Without it, our actions would be aimless. If we don't have proper "ETHICS" we cannot work towards our goals. And a high possibility of not pursuing your goals.


--> LAWS
DEFINITION :
                    Is a system of rules and guidelines, usually enforced through a set of institutions.


--> Computer Technology:
DEFINITION:
                    Computer technology is the activity used when designing, constructing and programming computers. Computer technology is used in the home, businesses, schools, hospitals and etc.



-->THE RELATIONSHIP OF LAW, ETHICS AND COMPUTER TECHNOLOGY

             The law is the implementation of ethics, that protects individual rights, protects ethical values of the people in the society. Law is also the floor to ethics. When you obey or dis obey the law, you've done the right/wrong things to do. When you apply law and ethics to computer technology, it's up to you on how you will deal with the all information you've acquired in the computer. If you do it for bad, you will get the consequences of what you've done in your work..



    
Read more...

♥ S.I.M.P.L.E ♥

| | 0 (mga) komento

Read more...

♥about M.E.:) ♥

Larawan Ko
♥ P.O.T.C.H.I_18 ♥ (JC Ann Marie Magno)
Batangas, Philippines
♥ a SIMPLE girl :)
Tingnan ang aking kumpletong profile

♥ F.O.L.L.O.W.E.R.S ♥

♥ M.U.S.I.C ♥

Pinapagana ng Blogger.
 
 
 
top