Theory Chapter 5

furiouserectΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

77 εμφανίσεις

Chapter 5

Identity / Authentication

You can protect computer system from accessing by
unauthorized persons through :



Identification

:having a user ID to logon computers or
network resources.


Authorization

: having an evidence that the person using
this resource is authorized


Authentication
:the act of establishing or confirming
something is authentic.


Passwords
: secret combination of letters and numbers to
grant access to the user.


Security

Data Security


Backups : complete, incremental, off
-
site


Firewall : a program that is installed on
network server to protect resources from
misuse.


Smart cards : contains an IC (integrated
circuit) can be as :memory cards or
microprocessor cards


Viruses

What are the viruses ?

A software that causes damage to in a computer


Types of Viruses :

(Worms , Boot
-
Sector , File Viruses , Macro Viruses , Trojan
Horses )


How a virus enters a computer System ?

They hide on your disks, when you access the disk the virus
infects the computer.


How can we protect our computers from viruses ?

Use an Antivirus like Norton ,PC
-
Cillin
, McAfee to disinfect
the computer


illegal Access

Hacking

: the process of gaining unauthorized access to
computers and resources.



Password Cracking
: the process of recovering
passwords from data stored on your computer.


Cryptography

Cryptography
: the study of hiding information.


Encryption
: converting data into a form that is not
easily understood by unauthorized people. Can be
read using
Decryption
.


Digital Signature
: an authentication on a document
that can be verified by the ones who have the public
key of the sender