The Word of God Holistic Wellness Institute

"Helping The World DISCOVER THE WAY of LOVE!"

Fast Cash Biz Free Download Data Protection In Computers

Let us first understand What is data? Data is nothing but, Fast Cash Biz Review information. All information in a computer is referred to as data. Data is a plural form of Latin word "Datum". In computer, what we type, is referred to as data. There are two types of data, first one is character or numerical data, and second one is referred to as binary. The first one is readable to human beings easily. The second one helps computers to function. They are readable by the computer programs.What is data protection: Generally, the word protection means the security given to something. For example, a house protects us from getting wet, when raining etc. In computers, the word protection is referred to protecting data from others, so, that others cannot get the information.

In computers, information is stored in hard disks, floppy disks, CD-ROM disks, etc. i.e. any secondary storage device, permanently. We need to protect it from getting accessed or modified or deleted. There are two categories of data; they are private and public. Private data features your name, password, address, telephone number etc. Public data is made available to public, information on some specific fields, which includes science, technology, mathematics, etc. Not all information on these fields are not public data. They may have private data also. It depends on how data is organized to protect it from being accessed.

http://restoreblock.com/fast-cash-biz-review/

Normally, we store information or data in the form of files, in the secondary storage devices. The computer checks whether the data is in protected mode. If it is true, then computer will not provide data to the user. Each of the file information is stored, in File Allocation Table (FAT), in case of Microsoft family of operating systems. File Allocation Table, is table of rows and columns, with each row corresponds to one file. The columns are, of, name of the file, address offsets from and to where data is to be read, different file attributes. One way, and perhaps, the only way to give protection to the file in FAT, FAT16, FAT32 is by hiding it and making it read only. But, that was not enough, as a user, knowing the existence of file, can reach it directly, without any difficulty. Microsoft later released NTFS (New Technology File System), which greatly increased the security options.

With the advent of client-server technology, the computer system had revolutionary changes. NTFS introduced a concept called File and Folder level security, where in, one can set options, with user name, and passwords. The user with sufficient permissions can access the file. However, there are several o*ther issues. The user name and passwords are to be made secured. So, they introduced a concept, called encryption and decryption. The basic idea of encryption is to convert data from one form to another. For example, suppose the letter 'A', may become 'Z' after encryption. Decryption is the just opposite of encryption. i.e. 'Z' should become, 'A', after reversing that is, decryption.

http://twochattysisters.com/fast-cash-biz-review/

Encryption and Decryption involves several complex mathematical formulas. One needs to be good in mathematics, to write programs, for encryption and decryption. Till today, no one knows the actual process except, the author of the program. But, several intelligent guesses can result in breaking of encryption code. So, several encryption and decryption algorithms came, which made guessing difficult. The research for best encryption and decryption process is already on its way.

The second security measure, apart from the encryption is, the firewall. A firewall is a program, which monitors the traffic.

The traffic is nothing but, a group of files. It may be a network file or an ordinary file. A firewall prevents the certain files or data from entering into system. It checks data or properties of the file and allows or blocks the file, depending on the condition set. Say for example, suppose, if one can prevent the file abc.txt from entering into the system. Like wise, we can block or allow the messages or files, which are willing to enter into our computer.The growth of technology has resulted in bringing high level security, in the computer system. However, a more advanced data security system need to be built, which will prevent, unauthorized access into the system, in the years to come.




Views: 4

Comment

You need to be a member of The Word of God Holistic Wellness Institute to add comments!

Join The Word of God Holistic Wellness Institute

May God Bless & Prosper You!

Peace, The Comforter, The Holy Spirit & The Spirit of Truth!

LOVING TO LEARN ASSOCIATION
"Holistic Wellness and Health"
Health, Education, and  Social Service: Crisis Intervention/Life Empowerment (323) 73-LIGHT
Appointments (323) 402-0422
Loving to Learn Online Store
Loving to Learn Online Store
"Over 300 Low Priced, Quality Products"

Your Holistic Wellness: Spirit, Body and Mind

Unity... Committed to God and You!

TIME IS RUNNING OUT!

 

© 2024   Created by Drs Joshua and Sherilyn Smith.   Powered by

Badges  |  Report an Issue  |  Terms of Service