Followers

Tuesday, August 16, 2011

PARTIAL REQUIREMENTS UNDER IT6

Biometric

The science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.

Encryption


Is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.


Access Control 

Is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.



Firewall

A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.


http://searchsecurity.techtarget.com/definition/firewall

Wednesday, June 29, 2011

Laws, Ethics and Computer Technology





Ethics --  also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right and wrong, virtue and vicejustice, etc.

Computer Technology --  refers to the design, construction and programming of computers. This broad definition encompasses a few major areas such as hardware, software and networking. Advanced areas involve artificial intelligence, robotics and biomedical forensics.