13. Data Security 1.pptxfsfsfsssssssssss

AchmadNaufalIrsyadi 4 views 8 slides Mar 05, 2025
Slide 1
Slide 1 of 8
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8

About This Presentation

Topic 1


Slide Content

Data Security 1 Achmad Naufal Irsyadi Dept. of Informatics Engineering, UNTAG - Sby ©2023

The Anatomy of Virus A biological virus is a very small, simple organism that infects living cells, known as the host, by attacking itself to them and using them to reproduce itself. This often causes harm to the host cells. Similarly, a computer virus is a very small program routine that infects a computer system and uses its resources to reproduce itself. It often does this by patching the operating system to enable it to detect program files, such as COM or EXE files. It then copies itself into those files. This sometimes causes harm to the host computer system. When the user runs an infected program, it is loaded into memory carrying the virus. The virus uses a common programming technique to stay resident in memory. It can then use a reproduction routine to infect other programs. This process continues until the computer is switched off. The virus may also contain a payload that remains dormant until a trigger event activates it, such as the user pressing a particular key. The payload can have a variety of forms. It might do something relatively harmless such as displaying a message on the monitor screen or it might do something more destructive such as deleting files on the hard disk.

Computer Crime Decide in your group what these kinds of computer crime are. Then match the crimes to the short descriptions which follow. Salami Shaving Denial of Service Attack Trojan Horse Trapdoors Mail Bombing Software Piracy Piggybacking Phishing Defacing Hijacking Go on the next slide for description!

Description – Computer Crime Leaving, within a completed program, an illicit program that allows unauthorized – and unknown = entry. Using another person’s identification code or using that person’s files before he has logged off. Adding concealed instruction to a computer program so that it will still work but will also perform prohibited duties. Tricking a user into revealing confidential information such as an access code or a credit-card number. Inundating an email address with thousands of messages, thereby slowing or even crashing the server. Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. Unauthorized copying of a program for sale or distributing to other users. Swamping a server with large numbers of requests. Redirecting anyone trying to visit a certain site elsewhere. Changing the information shown on another person’s website.

Direct and Indirect Speech

Direct and Indirect Speech The previous passage contains important grammatical unit, that was direct and indirect speech . Principally, when we report people’s words, thoughts, beliefs, etc., we can give the exact words that were said. This situation is called direct speech. Direct speech is repeating and restating person’s personal words, thoughts, arguments, and belief (what they say) in its origin as it is. There is no reduction or even modification of his words after transcribed into a direct speech. On the other hand, we can also make someone’s words or thoughts part of our own sentence by using conjunction with noun clause, changing the pronoun, tense, and other words necessarily. This kind of phenomenon is called as indirect speech. Indirect speech is repeating and restating person’s personal words, thoughts, arguments, and belief (what they say) using our own style or mode of sentence by changing a number of components, such as conjunction, pronoun, tense, etc.

Direct and Indirect Speech Direct Speech She said, “I want to go home”. Then, I told, “does he really mean it?” She asked, “What do want to buy?” “is this your cellphone?” asked John. Indirect Speech She said that she wanted to go home. Then, I wondered whether he really meant it or not. She asked what I wanted to buy. Using present tense in the speech, while past tense for the clause. Using quotation mark in the speech. Transcribing the real form of the speech. Using past tense for both the clause and the speech. Modifying speaker’s previous statement into our own language. No quotation mark is used. Can use that to mediate the speech.

Thank You
Tags