17.11.2011

Evgeny Nefedov
toc There are many methods of defense. In the past people built big castles with thick walls and strong doors. Also they built a drawbridges. Computer security uses control and detection. Detection includes cameras, which +are used for tracking and detection +of spies. Control includes antiviruses, firewalls, sniffers and encryption. Antiviruses need s to detect dangerous viruses and Trojan viruses. Firewall and sniffer check s you internet or local connections and watche s for suspicious data stream. 4 - - Женя, что с Вами случилось? (

Tsykarev Aleksey
Nowdays, there are many methods to steal the information. Accordingly, there are many methods of defense.If you want to be completely assured that you are protected, you should use such methods of __computer__ ? information/data protection as control and detection. It is necessary to find out +a threat in time. For this purpose, as a rule, we use cameras and scanning __utilities__. devices For control we use antiviruses, firewalls. Also, we use encryption for information protection. If you use all possible methods of defense then nobody can access to your information! 5-

Lena Berezkina
Nowdays there are many mechanisms of defense, but the most effective are Controls. Controls have 2 main functions: to protect information against harm and to detect harm. For detection we can use software, like antiviruses, and different hardware, for example, web cameras. For protection we can use antiviruses, firewall and encryption. Encryption can be weak and strong. A good example of strong encryption is scrambling (it is random choice). To secure valuable resources more effective ly is to use combination of different controls. As for +the history of controls, we can see that at all times people sought to protect themselves. They used strong doors, high walls, gatekeepers and others. 1321449513 5-

Yarushin Daniil
Controls. The important task of computer security is controls. When we say "security system" we can interpret physical aspect of it. For example, in Middle A ges castle s have had their own security system. It include d such parts as: без двоеточия strong door (protection against intrusion into the castle), heavy walls (protection from artillery and assault), moat (a wide water-filled ditch surrounding a fortified place - a castle) and gatekeepers (properly, the enemy fighters). In any security system there are elements making such function. One of main parts of controls is detection of threat. It can be achieved with +the help +of devices. Software devises allow us to control access (to management and to the data). They are antivirus software, firewalls. There are hardware devices, +which als o allow also +us to trace history of controls and to restrict access. They are cameras (video-), Input Panel password (possibly with the taking of fingerprint and scanning of eyes). Also there Another type of data control is encryption. It is used to store important information in untrusted sources or transfer it over insecure channels. But encryption does not solve all computer security problems. As a rule defense can be not only single-level ed. Specialists of CS often use overlapping defense, which include s a few elements of defense in every level. In most cases, this principle provides a more effective mechanism of protection. . 1321449513 4- а со мной-то что случилось?..или это норма уже... Почему норма? Немножко не справились, потому что текст не маленький.

Marat Abrarov
There are many ways of protection. For example, safes made ​​of titanium, which are protected by a code. __Variety of security cameras, alarm systems, security.__ нет сказуемого But in our time is very valuable information +is stored on your computer. Basically, __the penetration is through viruses__, фактическая ошибка: проникновение осуществляется не через вирусы, а через слабо защищённые места but there are exceptions. To protect against viruses, existing antivirus programs +exist. Antivirus detected detects the virus and neutralize s it. Also, to protect data, using encryption, firewall are used. __User controls and security settings__. непонятно There are __separate__ неподходящее слово professions. People in these professions are able to protect the information, people, buildings ... 2 в каждом предложении нужно проверять: наличие подлежащего и сказуемого, порядок слов, форму глагола. Иначе будет получаться не только неправильно, но и бессмысленно.