Computer Crime and Security

Computer Crime

  • Any illegal or unauthorized behaviour in connection with computers and computer networks.
  • Examples of computer crime include:

lcomputer sabotage.

lunauthorized access.

lcomputer forgery.

ldamage to computer data or programs.

lcomputer fraud.

lcomputer espionage.

lunauthorized use of a computer.

lunauthorized use of a protected computer program.

lHacking.

SOFTWARE SABOTAGE

Viruses and other invaders.

Also sabotage of hardware or software.

Modern computers saboteurs commonly use software.

Read More

Requirements Engineering: A Comprehensive Guide to Gathering, Analyzing, and Managing System Requirements

Requirements Engineering: A Comprehensive Guide

Introduction

Requirements engineering is the process of discovering, analyzing, documenting, and verifying the services required for a system and its operational constraints.

Types of Requirements

User Requirements:

  • Statements in natural language plus diagrams of services the system provides and its operational constraints.
  • Written for the users.

System Requirements:

  • A structured document setting out detailed descriptions of the functions, services, and operational
Read More

HTTP: Hypertext Transfer Protocol and Web Development

The HTTP (hypertext transfer protocol) is similar to many other Internet protocols such as SMTP (simple mail transfer protocol) and FTP (file transfer protocol), as HTP is a protocol for transferring data from one server to a client. The difference between HTTP and most other Internet protocols is that, while typical protocols support multiple requests per connection, only supports HTTP. This means that the HTTP client connects to the server to recover a single file and then disconnects.

HTML also

Read More

Database Management Systems: Concepts, Security, and Design

Advantages of Distributed Databases

Distributed databases offer several benefits:

  • Local Control of Data: Different departments or locations can manage their data locally.
  • Increased Database Capacity: Distributing data across multiple servers increases overall storage capacity.
  • System Availability: If one server fails, the database can often continue operating using other servers.
  • Improved Performance: Queries can be processed faster by distributing the workload.

The DBA’s Role in Access Privileges

The

Read More

Operating Systems Security and Resource Management

Virtual Memory

Why is it necessary to find contiguous main memory fragments for execution?

This is achieved through a combination of dynamic address translation and the use of page tables or segmentation. These mechanisms allow the operating system to divide a program’s memory space into smaller, manageable chunks that can be loaded into non-contiguous physical memory locations.

What is thrashing?

Thrashing occurs when the system spends excessive time swapping memory pages or segments between main memory

Read More

EVO Application Development Notes

NOTE: I think we need to upgrade to MVC2 for the roles to work properly in EVO. Seems to me that when I tried this in MVC1 it dod not work.

  • Users  (Remember – everything in this application must be multi language)
    • Add
      • Should provide a notification (similar to table maintenance) when the user data is saved.
      • After user is saved – the form needs to be reset.
      • Create one user, then press create user again and you’ll see the “Username” entry box is disabled. This might be fixed if we reset to form after
Read More