Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Krüptoraha on tõusuteel. Nüüd on just õige aeg osta! Ära riski ja kauple turvalises keskonnas -> TEE KONTO Sulge
Facebook Like
Add link

"vulnerabilities" - 10 õppematerjali

120
doc

Lühendite seletus

CUR Cursor (file name extension) CUSIP Committee for Uniform Security Identification Procedures [U.S. Treasury] CUT Control Unit Terminal CUTE Clarkston University Terminal Emulator CUU Cursor Up CVE Common Vulnerabilities and Exposures [US-CERT] CVF Compressed Volume File CVGA Color Video Graphics Array CVIA Computer Virus Industry Association .CVR Cover Page (file name extension) CVS Computer Vision Syndrome + Concurrent Versions System CVT Convert CVW CodeView for Windows CWA Competitive Web Analysis CWD Convert Word to Double Word + Change Working Directory [Internet] CWIS Campus Wide Information ServiceSystem [Internet] +...

Informaatika - Kutsekool
101 allalaadimist
1
rtf

Chat rooms

Just be aware of what you are doing and saying, and if you have small children, be sure to monitor their activity on the Internet. There are several programs, as I recall, that allow parents to track what their children are seeing and doing while on-line. One of the biggest threats on chat rooms is the presence of pedophiles, online stalkers and other predators always looking to exploit the vulnerabilities of pre-teens and young teens. Chat room regulars can become easily disconnected from real-life activities and extra-curricular pursuits, leading to general aloofness, less contact with real- world friends and a gradual process of social disengagement. Thats a good question. And it all depends on how responsible your child really is - and what kind of relationship you have with them. Chat rooms are the most common place kids find the...

Inglise keel - Keskkool
6 allalaadimist
15
docx

Andmeturve

Oht on seega kas: *potentsiaalne tervikluse rikkumine *potentsiaalne käideldavuse rikkumin *Potentsiaalne konfidentsiaalsuse rikkumine Ohtude liigitamine Ohte on võimalik liigitada: Turvalisuse komponendi järgi (mida ohustab) Allika järgi (mis põhjustab) Kahjustuse olulisuse seisukohalt (kui suure kahju tekitab) Reeglina ka...

Arvutiõpetus - Kutsekool
64 allalaadimist
17
docx

TPT Andmeturbe eksami küsimused ja vastused 2011

Informatsioon ehk teave (information) ­ teadmine, mis puudutab objekte, näiteks fakte, sündmusi, asju, protsesse või ideid ja millel on teatavas kontekstis eritähendus 1.1.Andmed (data) ­ informatsiooni taastõlgendatav esitus formaliseeritud kujul, mis sobib edastuseks, tõlgenduseks või töötluseks 1.2.Andmed on informatsiooni esitus, st tema kirjapanek mingis eelnevalt kokkulepitud kujul (mis võimal...

Arvutiõpetus - Kutsekool
37 allalaadimist
52
docx

Sissejuhatus infosüsteemidesse kontrolltöö teooria

Infosüsteemide (IS) valdkond (IS valdkonna spetsialisti teadmised) Infosüsteemide valdkond Tegeleb kõigega, mis on seotud inimvõimete suurendamisega infotehnoloogia abil ja see puudutab: · probleemide lahendamist · otsuste vastuvõtmist · vajalike tegevuste sooritamist · arusaamise/mõistmise loomist Täpsemalt tegeletakse probleemidega, mis on seotud infotehnoloogiliste ressursside ja te...

Sissejuhatus... - Tallinna Tehnikaülikool
312 allalaadimist
7
pdf

Sotsiaalne tarkvara ja võrgukogukonnad wiki

It is estimated that the information of 77 million users was compromised. Sources "based on information currently available to Sony, our currently known costs associated with the unauthorized network access are estimated to be approximately 14 billion yen," or about $171 million. http://www.informationweek.c...

Informaatika - Tallinna Tehnikaülikool
8 allalaadimist
6
docx

Turvaauk CVE-2014-1705

CVE-2014-1705 CVE-2014-1705 kirjeldab turvaauku, mis leiti Google JavaScript mootoris V8, mida kasutati Google Chrome enne versiooni 33.0.1750.152 OS X-il ja Linuxil ning enne versiooni 33.0.1750.154 Windowsil. V8 on avatud allikaga JavaScript mootor, mis on kirjutatud keeles C++ ja kasutatakse Google Chrome-is. See kasutab ECMAScripti ja töötab Windows XP-l ja Vi...

Andmeturbe alused -
3 allalaadimist
548
pdf

Cialdini raamat

and the contagion of violence in such tragedies as the Virginia Tech and North- o Enhanced coverage of "how to say no." New evidence is presented to ern Illinois mass killings. help readers identify their special e Added coverage of social influence vulnerabilities to various techniques effects in new technologies, such as of persuasion. persuasion resulting from on line banner ads and the subliminal presentation o Twice as many Reader's Reports- first-person accounts in which readers of odors. of previous editions...

Psühholoogia -
19 allalaadimist
14
docx

Misusing and Abusing the IoT ( Ingliskeelne referaat andmeturve ITX0040 jaoks)

Privacy One of the most discussed issues concerning the security of the internet of things is the issue of privacy. According to a study done by HP, 70 percent of the most frequently used IoT devices containt vulnerabilities . One of the most common security issue was privacy related. It appears that 90% of the tested devices collected at least one piece of personal information [3]. Due to the variety of tasks the devices connected to the IoT monitor and administer, the amount of information to extract from those devices is fairly large. A british IT-consultant discovered that the LG made smart-TV has been sending back information to the company, about what s...

Andmeturbe alused -
6 allalaadimist
9
docx

Big data in cloud

Hiring the right talent and applying the right tools is crucial to make relevant decisions from a big data project. [21] Some aforementioned products also bring new never-seen problems with them. As cybersecurity has never been more important than it is now, then making sure, that your product isn't misused and it cant be leaked is a must. There are multiple ways hackers can attack databases and take advantage of their vulnerabilities. Few examples of inside-based attacks are: Academic essay (ITI0103) 2019 spring - Abusing excessive privileges. When the user is granted additional privileges that the user doesn't initially require can result in unexpected results, as the user, who only needs read-only privileges, but is granted full administrative powers, can edit the data he initially was not supposed...

Algoritmid ja andmestruktuurid - Tallinna Ülikool
2 allalaadimist


Registreeri ja saadame uutele kasutajatele
faili e-mailile TASUTA

Konto olemas? Logi sisse

Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun