Welcome to my “Common software problems and solutions.”
The computer's capabilities are related to the use of the software.
The program (program, routine) is an ordered sequence of instructions (instructions) for the computer to solve the problem.
Software (software) (software) is a set of programs for processing data and documents necessary for their operation.
The programs are designed for machine implementation of tasks. The terms Task and Application are very widely used in the context of computer science and software.
The task (task, problem) is the problem to be solved
Application (application) - the software implementation of the solution of the problem on the computer.
Thus, the task means a problem to be realized with the use of information technology tools, and the application is a solution of the problem realized on the computer.
All programs by the nature of use and categories of users can be divided into two classes: Utilitarian programs and Software products (products).
Utilitarian programs are designed to meet the needs of their developers. Usually, they serve as a service in data processing technology or they are programs for solving problems that are not intended for wide distribution.
Software products (products) are designed to meet the needs of users, wide distribution and sale.
Currently, there are other options for the legal distribution of software products that have emerged using global or regional telecommunications:
¾ freeware - free programs, freely distributed, are supported by the user, who is authorized to make the necessary changes to them;
¾ shareware - non-commercial (shareware) programs that can be used, as a rule, for free; Subject to the regular use of such products, a certain amount is paid.
The software product should be appropriately prepared for operation, have the necessary technical documentation, provide service and guarantee the reliable operation of the program, have the manufacturer's trademark, and preferably have a state registration code. Only under such conditions, the created software package can be called a software product.
A software product is a set of interrelated programs for solving a certain problem (task) of mass demand, prepared for implementation as any kind of industrial products.
The program (program, routine) is an ordered sequence of instructions (instructions) for the computer to solve the problem.
Software (software) (software) is a set of programs for processing data and documents necessary for their operation.
The programs are designed for machine implementation of tasks. The terms Task and Application are very widely used in the context of computer science and software.
The task (task, problem) is the problem to be solved
Application (application) - the software implementation of the solution of the problem on the computer.
Thus, the task means a problem to be realized with the use of information technology tools, and the application is a solution of the problem realized on the computer.
All programs by the nature of use and categories of users can be divided into two classes: Utilitarian programs and Software products (products).
Utilitarian programs are designed to meet the needs of their developers. Usually, they serve as a service in data processing technology or they are programs for solving problems that are not intended for wide distribution.
Software products (products) are designed to meet the needs of users, wide distribution and sale.
Currently, there are other options for the legal distribution of software products that have emerged using global or regional telecommunications:
¾ freeware - free programs, freely distributed, are supported by the user, who is authorized to make the necessary changes to them;
¾ shareware - non-commercial (shareware) programs that can be used, as a rule, for free; Subject to the regular use of such products, a certain amount is paid.
The software product should be appropriately prepared for operation, have the necessary technical documentation, provide service and guarantee the reliable operation of the program, have the manufacturer's trademark, and preferably have a state registration code. Only under such conditions, the created software package can be called a software product.
A software product is a set of interrelated programs for solving a certain problem (task) of mass demand, prepared for implementation as any kind of industrial products.
Information security is the property of transmitted, accumulated, processed and stored information, characterizing its degree of protection from the destabilizing influence of the external environment (man and nature) and internal threats, that is, its confidentiality (secrecy, semantic or information secrecy), signal secretiveness (energy and structural) and integrity - resistance to destructive, imitating and distorting influences and interference.
The above narrow interpretation of the information protection process is focused primarily on the use of organizational measures and technical methods and means of protection.
Under the protection of information, in a broader sense, understand the complexities of organizational, legal and technical measures to prevent threats to information security and to eliminate their consequences.
In this case, the concept of information security characterizes the state (property) of information security of a person, society, nature in the context of the possible action of two types of threats:
- Disclosure of their secrets
- Negative (accidental or deliberate) impact of information on their information subsystems:
- consciousness and psyche of an individual
- mass consciousness
- information environment (space) of the society
- information-sensitive elements of natural objects.
The RF law "On Security" (1992) singles out the information component of national security as "a state of protection of the vital interests of the individual, society and the state from internal and external threats" in the sphere of information relations.
The objects of information security of the Russian Federation include:
- All types of information resources
- The rights of citizens, legal entities and the state to receive, disseminate, and use information, protect confidential information and intellectual property
- The system of formation, distribution, and use of information resources, including information systems of various classes and purposes, libraries, archives, databases and databases, information technology, regulations and collection procedures. Processing, storage and transfer of information, scientific and technical and maintenance personnel
- Information infrastructure including information processing and analysis centers, information exchange and telecommunications channels, mechanisms for the operation of telecommunication systems and networks, including systems and means of protection and information
- Systems for the formation of public consciousness (outlook, moral values, moral assessments, socially acceptable behavior stereotypes and relationships between people), based on the media and propaganda.
The main object of protection in ensuring the information security of the individual, society, and the state are information resources (regardless of the forms of organization, storage and presentation of information) protected by copyright and patent law and not protected as intellectual property and containing state secrets, trade secrets, limited access information and other confidential information, as well as including open (generally available) information about the life of society and the private life of a person.
The information security system represents a set of legislative acts and normative legal documents (legal support), public authorities and management and organizational measures in the field of information protection (organizational support), scientific developments and technical methods and means (scientific and technical support). It is based on the following basic principles:
- compliance with the balance of interests of the individual, society and the state in the information sphere;
- the organic unity of information and information protection processes;
- hierarchical organization of its structure and rational combination of centralized and regional measures to protect information;
- the integrated nature of protection against threats;
- economic feasibility (sufficiency), etc.
The notion of "information security" characterizes the degree of protection of a person, society, state, nature in the information plan and includes a narrower concept of "information security" related to such objects of protection as the information itself, information systems and technologies.
Protection of personal data (information about citizens, information about the individual) is regulated primarily by the following basic laws and bills: "On Information, Informatization and Protection of Information", "On State Secrets", "On Commercial Secrets", "On Personal Data", " On the right to information. "
Personal data refers to any documented information that relates to a particular person, or information that can be identified with a specific person.
Personal data includes nominative and impersonal data. Nominative data - the kind of personal data that allows, at some costs of temporary,
The above narrow interpretation of the information protection process is focused primarily on the use of organizational measures and technical methods and means of protection.
Under the protection of information, in a broader sense, understand the complexities of organizational, legal and technical measures to prevent threats to information security and to eliminate their consequences.
In this case, the concept of information security characterizes the state (property) of information security of a person, society, nature in the context of the possible action of two types of threats:
- Disclosure of their secrets
- Negative (accidental or deliberate) impact of information on their information subsystems:
- consciousness and psyche of an individual
- mass consciousness
- information environment (space) of the society
- information-sensitive elements of natural objects.
The RF law "On Security" (1992) singles out the information component of national security as "a state of protection of the vital interests of the individual, society and the state from internal and external threats" in the sphere of information relations.
The objects of information security of the Russian Federation include:
- All types of information resources
- The rights of citizens, legal entities and the state to receive, disseminate, and use information, protect confidential information and intellectual property
- The system of formation, distribution, and use of information resources, including information systems of various classes and purposes, libraries, archives, databases and databases, information technology, regulations and collection procedures. Processing, storage and transfer of information, scientific and technical and maintenance personnel
- Information infrastructure including information processing and analysis centers, information exchange and telecommunications channels, mechanisms for the operation of telecommunication systems and networks, including systems and means of protection and information
- Systems for the formation of public consciousness (outlook, moral values, moral assessments, socially acceptable behavior stereotypes and relationships between people), based on the media and propaganda.
The main object of protection in ensuring the information security of the individual, society, and the state are information resources (regardless of the forms of organization, storage and presentation of information) protected by copyright and patent law and not protected as intellectual property and containing state secrets, trade secrets, limited access information and other confidential information, as well as including open (generally available) information about the life of society and the private life of a person.
The information security system represents a set of legislative acts and normative legal documents (legal support), public authorities and management and organizational measures in the field of information protection (organizational support), scientific developments and technical methods and means (scientific and technical support). It is based on the following basic principles:
- compliance with the balance of interests of the individual, society and the state in the information sphere;
- the organic unity of information and information protection processes;
- hierarchical organization of its structure and rational combination of centralized and regional measures to protect information;
- the integrated nature of protection against threats;
- economic feasibility (sufficiency), etc.
The notion of "information security" characterizes the degree of protection of a person, society, state, nature in the information plan and includes a narrower concept of "information security" related to such objects of protection as the information itself, information systems and technologies.
Protection of personal data (information about citizens, information about the individual) is regulated primarily by the following basic laws and bills: "On Information, Informatization and Protection of Information", "On State Secrets", "On Commercial Secrets", "On Personal Data", " On the right to information. "
Personal data refers to any documented information that relates to a particular person, or information that can be identified with a specific person.
Personal data includes nominative and impersonal data. Nominative data - the kind of personal data that allows, at some costs of temporary,
No comments:
Post a Comment