انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

"Chapter Eleven "The Risks of Computing

Share |
الكلية كلية العلوم     القسم قسم الفيزياء     المرحلة 4
أستاذ المادة ليث طالب هادي قدوري       14/10/2012 06:48:17
Chapter Eleven
The Risks of Computing
1
11-1 Protecting Your Data or computer
Because lives have become so dependent on computing,
users are vulnerable to computers or specific data on the computer, being
stolen or damaged. The cost of repairing or replacing computer equipment is
a concern. The interruption of services and the replacing of lost information
often cost a lot more than the equipment. Having your data stolen is a big
concern for users on the Internet, regardless of whether it is through
someone “hacking” into a computer or a matter of copyright infringement.
Theft There are many steps one can take to protect computer equipment
against theft. There are systems where by you can lock computers in special
cabinets or, by using durable cables, tie them to the desk. Video camera
surveillance is very effective for areas with a large number of computers like
central offices and network rooms.
Damage The same common sense rules apply as for any other equipment
regarding physical damage.
Data Loss Losing your data can occur through hackers, hardware failure,
power spikes, accidental deletions, or disgruntled employees. If you provide
a critical service, you should have an emergency plan in place to cope with
the loss of your system. This includes having backup copies of the data
offsite, access restrictions for network users, and security measures to
prevent unauthorized people from entering your computer or network.
Backups Your data should be backed up regularly and the backup copies
stored in another location. Only the data needs to be backed up as the
application programs can always be reinstalled from the original media. Also
consider having backup copies of the application programs in case the
original media is no longer available or works.

المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
الرجوع الىلوحة التحكم