Do you like this blog

Friday, April 10, 2009

2nd Quiz

Explain six ways in which you can protect the data stored on a computer system.
Terangkan 6 kaedah yang membolehkan anda melindungi data yang telah disimpan dalam suatu sistem komputer.

Give your answer by using the comment. Write your name and class. Each correct answer will received RM2.00. Total prize for this quiz is RM12.00. Closing date is 30 April 2009.

14 comments:

sohai~ said...

cekgu nie shweet!!....
msti anak pown apet...
lalalalala...
ceramh nie ok r...
xde r teruk sngt...
pew r kowg nie....
cekgu apet2 ajar layan jew r....
papepown mintak2 soalan yg cekgu haliza kasi nie kuar exam...
amiiinnn.....

~lonely day~

sohai~ said...

slh anta ler!!....
sory cekgu...
uhuhu

Anonymous said...

+A method of protecting data, stored in a memory device of a computer system connected to a SCSI interface, against, unauthorized access whereby access by the computer system to the memory device is either permitted or refused, depending upon the authorization of a request, by an exchange of information between the computer system and the memory device at the SCSI interface. Authorization is by means of identification of an authorized user. During access by the computer system to the memory device, any kind of operation with the memory device can be blocked, or access permission given for memory readout only, or for readout and recording, or only for recording. The equipment for carrying out the method includes a memory device connected by a SCSI bus to a host computer system, while between the memory device and the host computer system there an additional control unit with authorization block is inserted.+
(affan)5utm

Anonymous said...

muzaffar > syafiq ( 5UTM )
1.Melalui software backup seperti nero backup
-klik backup nero transfer ke hardisk or cd/dvd writer.

6 example software :

2.software Drive Backup Express
-Easily backup your entire PC including OS, applications, settings, and data.

3.software Alcohol 120% 1.9.8.7530
-Create virtual CD/DVD-ROMs and burn backup copies of your favorite discs

4.software Ashampoo Burning Studio Free 6.75
-Burn the files and images on CD and DVD discs.

5.BurnAware Free 2.3.3
-Compile and burn data discs, audio CDs, video DVDs, and disc images.

6.Backup Plus 7.7.1
-Keep important data safe with a backup on removable media.

7.software Easy DVD Shrink 3.0.24
-Back up your video collection on DVD or a hard drive.

Anonymous said...

jwapan saye x buat point,,(affan)

Anonymous said...

Aidil ( 5UTM )

Tips for Successful Data Recovery

No matter how hard you try to protect your data, your system may still fall victim to data loss. Regardless of the cause of your data loss, there are steps you can take to keep your data loss from becoming a data disaster.

Don't panic. You should never assume your lost data is unrecoverable. If you use our Internet Archive feature, simply send us an email requesting your database and we will email it to you within 24 hours.
If you haven't used our Internet Archive feature, you can call a qualified data recovery expert. In most cases, your data is fully recoverable. Some local computer stores will simply wipe your hard drive and install a clean copy of Windows Operating System and make no attempt to save data. If you did not make backups, very clearly explain to them you must have the database recovered from the drive before wiping the drive. The only file you need is the SS.MDB file from the installation folder of our software. If possible, also ask them to save all the .RTF files in our folder also. These files are your customer letters and rental agreement.
Do not use file recovery software if you suspect an electrical or mechanical failure. Using file recovery software on a faulty hard drive may destroy what was otherwise recoverable data.
"Undelete" tools can save your data from human error. Most disk utility packages contain a function that allows you to retrieve an erased file. This tool must be used immediately; however, because your computer will quickly write new data over the deleted file. Microsoft Windows stores deleted files in the recycle bin and can be restored as long as you haven't emptied the recycle bin. For more information see your Windows documentation or help file.
Do not clean or operate equipment damaged by a natural disaster. Whether it's a flash flood or a twisting tornado, if you've fallen victim to a natural disaster, there are few options. Contact a qualified data recovery expert before you attempt to turn on the computer. Your chances for a successful recovery are greatly reduced if you make any attempts yourself to clean or dry your damaged computer.
If your data falls victim to computer crime, seek professional advice. Computer crime is a growing threat to data. Intentional data deletion, duplication and theft increasingly threaten valuable computer information. There are several software packages that specialize in computer theft diagnosis and electronic evidence gathering.
Create and maintain reliable backups. It's surprising how few people actually backup their systems regularly, and how fewer people actually test and verify that the backups are complete and error free.
If you have suffered data loss, seek professional help. Professional data recovery services offer the expertise and tools required to recover your data quickly and efficiently.

Anonymous said...

Amir ( 5UTM )

Caring for Your Hard Disk Drive

Despite the obvious importance of this equipment to your system, many users neglect to care for their hard disk drive. Your drive is easily susceptible to many sources of damage. Tredd’s Self Storage Software offers the following tips to protect and care for your hard drive:

Protect your drive from excessive jarring and bumping. All too often, when people install, move or reconfigure hard disk drives, they knock the drive around unintentionally, damaging equipment that can result in the loss of data.
Beware of static. Static electricity, an unseen and unfelt enemy, can wreak havoc on the wiring inside computer chips and transistors. Because it's so easy to discharge built-up static when you touch a hard disk drive, precautions like wrist straps can help prevent static discharge.
Acclimatize the room in which you store your equipment. Be careful of temperature, humidity, altitude and vibration, all forces that could lead to the intermittent or total failure of hard drives.
Perform periodic checks of your hard disk drive. Windows comes with software to check your hard disk drive or you can purchase numerous software packages to do this. Beware of advice from friends about defragging your hard disk drive monthly or weekly. Unless you constantly adding and removing software packages to your computer, defragging every six months is more then enough.
Place your hardware in a safe location. When you move your computer to a new position (from your desk to the floor, or from a horizontal to a vertical position), you should always backup the hard disk drive. An accidental bump to the drive could cause the heads to track differently, resulting in disk read or write errors.

Anonymous said...

Syafiq ( 5UTM )

Step1 - Protect your computer against viruses and spyware. These are typically sent through email or your browser. Viruses can cause tons of damage to stored data. They can delete files and provide others access to your computer. Be sure to install a quality anti-virus/anti-spyware program onto your computer.
Step2 - If your computer is always connected to the Internet via a broadband connection, be sure to set up a firewall. This will stop outsiders from seeing data on your computer.
Step3 - Keep your software updated. Install security updates as soon as possible. This will help to protect you from new viruses and spyware programs.
Step4 - Use passwords whenever possible. Use a password that combines numbers and letters.
Step5 - Log off your computer when you are not actually using it.
Step6 - If you have particularly important or sensitive files stored on your computer, protect these individual files. Use an encryption program to protect these files and limit access to these files with passwords.
Step7 - Back up important data that is stored on your computer. Get into the habit of copying important files. You can copy files to a CD, DVD or an external hard drive.

teacher abd aziz said...

muzaffar > syafiq ( 5UTM ) answer for using bakcup to protect data in the computer system is correct. but your expalanation is not clear.
you can answer mostly like this.
- we can protect our data stored in the computer system by using backup. for example we can use nero backit up program or simply make another copy of your files to other storage device. But, it is better if we use backup program because it can compress your files to smaller size.

thus, you can claim your prize but only RM1.00

teacher abd aziz said...

Syafiq (5UTM)

you have answered the questions clearly. your explanation is good. claim yoour prize RM10.00 as for backup answer has already given, I can't give you RM12.00. congratulations!! good explanation.

teacher abd aziz said...

affan, aidil, amir, good try even though your answer and explanation is not clear. if you found information on the internet, you must read it through and understand first. do not copy and paste. it is a bad habit!! same goes to other students who like to copy and paste. no originality and it shows that you are lazy person.

Anonymous said...

hahahah!!!!

Anonymous said...

NAZRIN(5UPM)..cikgu mintak enam..saya bagi 10..


#1: Back up early and often

The single most important step in protecting your data from loss is to back it up regularly. How often should you back up? That depends--how much data can you afford to lose if your system crashes completely? A week's work? A day's work? An hour's work?

You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.

There are also numerous third-party backup programs that can offer more sophisticated options. Whatever program you use, it's important to store a copy of your backup offsite in case of fire, tornado, or other natural disaster that can destroy your backup tapes or discs along with the original data.
#2: Use file-level and share-level security

To keep others out of your data, the first step is to set permissions on the data files and folders. If you have data in network shares, you can set share permissions to control what user accounts can and cannot access the files across the network. With Windows 2000/XP, this is done by clicking the Permissions button on the Sharing tab of the file's or folder's properties sheet.

However, these share-level permissions won't apply to someone who is using the local computer on which the data is stored. If you share the computer with someone else, you'll have to use file-level permissions (also called NTFS permissions, because they're available only for files/folders stored on NTFS-formatted partitions). File-level permissions are set using the Security tab on the properties sheet and are much more granular than share-level permissions.

In both cases, you can set permissions for either user accounts or groups, and you can allow or deny various levels of access from read-only to full control.
#3: Password-protect documents

Many productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. To open the document, you must enter the password. To password-protect a document in Microsoft Word 2003, go to Tools | Options and click the Security tab. You can require a password to open the file and/or to make changes to it. You can also set the type of encryption to be used.

Unfortunately, Microsoft's password protection is relatively easy to crack. There are programs on the market designed to recover Office passwords, such as Elcomsoft's Advanced Office Password Recovery (AOPR). This type of password protection, like a standard (non-deadbolt) lock on a door, will deter casual would-be intruders but can be fairly easily circumvented by a determined intruder with the right tools.

You can also use zipping software such as WinZip or PKZip to compress and encrypt documents.
#4: Use EFS encryption

Windows 2000, XP Pro, and Server 2003 support the Encrypting File System (EFS). You can use this built-in certificate-based encryption method to protect individual files and folders stored on NTFS-formatted partitions. Encrypting a file or folder is as easy as selecting a check box; just click the Advanced button on the General tab of its properties sheet. Note that you can't use EFS encryption and NTFS compression at the same time.

EFS uses a combination of asymmetric and symmetric encryption, for both security and performance. To encrypt files with EFS, a user must have an EFS certificate, which can be issued by a Windows certification authority or self-signed if there is no CA on the network. EFS files can be opened by the user whose account encrypted them or by a designated recovery agent. With Windows XP/2003, but not Windows 2000, you can also designate other user accounts that are authorized to access your EFS-encrypted files.

Note that EFS is for protecting data on the disk. If you send an EFS file across the network and someone uses a sniffer to capture the data packets, they'll be able to read the data in the files.
#5: Use disk encryption

There are many third-party products available that will allow you to encrypt an entire disk. Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it's written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the "outer" disk.

Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users. Examples include PGP Whole Disk Encryption and DriveCrypt, among many others.
#6: Make use of a public key infrastructure

A public key infrastructure (PKI) is a system for managing public/private key pairs and digital certificates. Because keys and certificates are issued by a trusted third party (a certification authority, either an internal one installed on a certificate server on your network or a public one, such as Verisign), certificate-based security is stronger.

You can protect data you want to share with someone else by encrypting it with the public key of its intended recipient, which is available to anyone. The only person who will be able to decrypt it is the holder of the private key that corresponds to that public key.
#7: Hide data with steganography

You can use a steganography program to hide data inside other data. For example, you could hide a text message within a .JPG graphics file or an MP3 music file, or even inside another text file (although the latter is difficult because text files don't contain much redundant data that can be replaced with the hidden message). Steganography does not encrypt the message, so it's often used in conjunction with encryption software. The data is encrypted first and then hidden inside another file with the steganography software.

Some steganographic techniques require the exchange of a secret key and others use public/private key cryptography. A popular example of steganography software is StegoMagic, a freeware download that will encrypt messages and hide them in .TXT, .WAV, or .BMP files.
#8: Protect data in transit with IP security

Your data can be captured while it's traveling over the network by a hacker with sniffer software (also called network monitoring or protocol analysis software). To protect your data when it's in transit, you can use Internet Protocol Security (IPsec)--but both the sending and receiving systems have to support it. Windows 2000 and later Microsoft operating systems have built-in support for IPsec. Applications don't have to be aware of IPsec because it operates at a lower level of the networking model.

Encapsulating Security Payload (ESP) is the protocol IPsec uses to encrypt data for confidentiality. It can operate in tunnel mode, for gateway-to-gateway protection, or in transport mode, for end-to-end protection. To use IPsec in Windows, you have to create an IPsec policy and choose the authentication method and IP filters it will use. IPsec settings are configured through the properties sheet for the TCP/IP protocol, on the Options tab of Advanced TCP/IP Settings.
#9: Secure wireless transmissions

Data that you send over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don't need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn't configured securely.

You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP).
#10: Use rights management to retain control

If you need to send data to others but are worried about protecting it once it leaves your own system, you can use Windows Rights Management Services (RMS) to control what the recipients are able to do with it. For instance, you can set rights so that the recipient can read the Word document you sent but can't change, copy, or save it. You can prevent recipients from forwarding e-mail messages you send them and you can even set documents or messages to expire on a certain date/time so that the recipient can no longer access them after that time.

To use RMS, you need a Windows Server 2003 server configured as an RMS server. Users need client software or an Internet Explorer add-in to access the RMS-protected documents. Users who are assigned rights also need to download a certificate from the RMS server.

teacher abd aziz said...

nazrin, this quiz already has a winner

Post a Comment

  ©ICT SMK Tun Syed Nasir Ismail - Todos os direitos reservados.

Template by Dicas Blogger | Topo