Thursday, March 24, 2011

Protection & Security


Recognize security policy and mechanism.

   In computer science, protection mechanisms are built into a computer architecture to        support the enforcement of security policies. A simple definition of a security policy 
   set who may use what information in a computer system.Mechanism for controlling the    
   access of programs, processes, or users the resources defined by the computer
   system. the protentation mechanism ensures the enforcement of a certain policy.

 Elaborate authentic basic.

Password
*        A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.

Artifact

*     In natural science and signal processing, an artifact is any error in the perception or  representation of any visual or aural information introduced by the involved equipment or technique(s).
*         In computer science, digital artifacts are anomalies introduced into digital signals as a    
            result of digital processing.
*         In microscopy, artifacts are sometimes introduced during the processing of samples into   
            slide form. See Artifact (microscopy)

Biometric

*       Biometrics consists of methods for uniquely recognizing humans based upon one or more
          intrinsic physical or behavioral traits. In computer science, in particular, biometrics is
          used as a form of identity access management and access control. It is also used to
          identify individuals in groups that are under surveillance.





Elaborate protection concept and access control.

·         For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
·         Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
·         At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
·         The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.


No comments:

Post a Comment