28 research outputs found

    English About Antivirus Software

    Get PDF
    Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software is also known as virus protection software. With this software, we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today\u27s antivirus Progress has been transformed and has many uses associated with the virus. But also the computer\u27s performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its empowering. Even by new viruses though

    English about antivirus software

    Get PDF
    Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software is also known as virus protection software. With this software, we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today's antivirus Progress has been transformed and has many uses associated with the virus. But also the computer's performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its empowering. Even by new viruses though

    Failure propagation in GMPLS optical rings: CTMC model and performance analysis

    Get PDF
    Network reliability and resilience has become a key design parameter for network operators and Internet service providers. These often seek ways to have their networks fully operational for at least 99.999% of the time, regardless of the number and type of failures that may occur in their networks. This article presents a continuous-time Markov chain model to characterise the propagation of failures in optical GMPLS rings. Two types of failures are considered depending on whether they affect only the control plane, or both the control and data planes of the node. Additionally, it is assumed that control failures propagate along the ring infecting neighbouring nodes, as stated by the Susceptible-Infected-Disabled (SID) propagation model taken from epidemic-based propagation models. A few numerical examples are performed to demonstrate that the CTMC model provides a set of guidelines for selecting the appropriate repair rates in order to attain specific availability requirements, both in the control plane and the data plane.This work is partially supported by the Spanish Ministry of Science and Innovation project TEC 2009-10724 and by the Generalitat de Catalunya research support programme (SGR-1202). Additionally, the authors would like to thank the support of the T2C2 Spanish project (under code TIN2008-06739-C04-01) and the CAM-UC3M Greencom research grant (under code CCG10-UC3M/TIC-5624) in the development of this work.Publicad

    NATO küberkaitsestrateegiad aastatel 2007-2015

    Get PDF

    European Cyber Security Policy

    Full text link
    The gradually developing European cyber security policy tries to establish minimum standards in all EU member states with regard to prevention, resilience and international cooperation. It aims to foster national security without compromising democratic principles or unduly limiting individual liberties. However, it is hard to find a balance between these goals, and the EU’s measures thus inevitably raise questions about the democratic implications of European cyber security policy. Are the institutional structures and instruments of European cyber security policy compatible with the criteria of democratic governance? In order to answer this question, this study first outlines the main challenges related to the promotion of Internet security. After that, the study presents the institutional architecture of global cyber security policy and identifies the key principles of organisation behind European cyber security policy. In conclusion, the study assesses how compatible the institutional framework of European cyber security policy is with democratic criteria and discusses ways to enhance cyber security without violating democratic principles. (author's abstract

    Conundrum

    Get PDF

    Break on Through: An Analysis of Computer Damage Cases

    Get PDF
    The following Article is an extensive inquiry into computer damage cases through a comprehensive study of over three hundred computer damage cases. Throughout the study, the authors have performed an empirical categorization of the essential aspects of computer damage cases and analyzed the most relevant issues, interpretations, and arguments available for each computer damage category. These categories include fundamental facets, such as legal elements; motive and intent; results; profile of perpetrators; and means of perpetration, including, if applicable, the software involved. The Article provides a comprehensive analysis and conceptual approach for understanding computer damage cases by discussing the legal elements of computer damage offenses under the CFAA; considering the CFAA’s practical application; discussing the essential features involved in the perpetration of computer damage offenses and profiling the attackers; and summarizing the researchers’ findings

    Europäische Cybersicherheitspolitik

    Full text link
    Die sich allmählich entwickelnde europäische Cybersicherheitspolitik soll helfen, vereinbarte Mindeststandards in allen ihren Mitgliedstaaten umzusetzen, und zwar bei Prävention, Abwehrbereitschaft (resilience), Reaktion und internationaler Kooperation. Sie soll nationale Sicherheit befördern, jedoch ohne gegen demokratische Grundprinzipien zu verstoßen und die individuellen Freiheiten über Gebühr zu beschränken. Es ist nicht leicht, beides miteinander in Einklang zu bringen. Daher stellt sich die Frage nach den demokratiepolitischen Implikationen der europäischen Cyberpolitik. Wie verhalten sich deren institutionelle Strukturen und Instrumente zu den Anforderungen demokratischen Regierens? Um dies zu klären, werden zunächst die wesentlichen Herausforderungen für das Bemühen um mehr Sicherheit im Internet skizziert. Daraufhin wird die institutionelle Architektur der globalen Cybersicherheitspolitik umrissen, und die wichtigsten Organisationsprinzipien europäischer Cyberpolitik werden identifiziert. Schließlich wird bewertet, inwieweit diese Architektur mit demokratischen Grundsätzen vereinbar ist, und es werden Vorschläge diskutiert, wie mehr Sicherheit im Internet herzustellen wäre, ohne jene Prinzipien zu verletzen.(Autorenreferat
    corecore