1 / 13

Storage and Security of Digital Information

Storage and Security of Digital Information. Rouda’s CSCI 101 Sections. http://www.flickr.com/photos/selvin/2762032143/. "Permanent" Storage Media. Computer Hard Drive Optical Disks CD DVD BlueRay Magnetic Tape Tape Drive Solid State Flash Drives SSD Hard Drives.

Download Presentation

Storage and Security of Digital Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Storage and Security of Digital Information Rouda’s CSCI 101 Sections http://www.flickr.com/photos/selvin/2762032143/

  2. "Permanent" Storage Media • Computer Hard Drive • Optical Disks • CD • DVD • BlueRay • Magnetic Tape • Tape Drive • Solid State • Flash Drives • SSD Hard Drives

  3. Relative Storage Capacities • CD ROM ≈ 650 MB • DVD ≈ 4.7 GB (single layered) • BlueRay ≈ 25 GB (single layered) • Flash ≈ 256 GB+, continues increasing • Flash Drive Costs: • in 2006 $25 bought 125MB • in 2007 $25 bought 2GB • in 2008 $25 bought 8GB • in 2009 $15 bought 8GB • In 2010 $25 bought 16GB • In 2012 $35 buys a 32GB

  4. How Data is Stored on Disks • 1s and 0s • Sectors • Directory • file deletion • Disk Fragmentation • How often to defrag? • Do you defrag on a Mac? http://www.detto.com/rmf-data-recovery-how-to.html

  5. Viruses Harmful Software • Virus • usually destroys files • copies itself • ex - a MSWord macro sent via email • Worm • objective: destroy the network, not your PC • copies itself via network connections

  6. Viruses Harmful Software • Trojan Horse • arrives inside something else • replicates itself • the really bad ones wait for a particular date • Spyware • objective: steal information • personal information (bank account info, …) • passwords • e.g. monitor and transmit your keyboard input

  7. Viruses Virus Protection • Anti-Virus Software (Anti-Malware) • looks for known viruses and common virus formats • Firewalls • prohibits unauthorized external access into your PC or network. Can be hardware or software.

  8. Legal Issues Computer Crime • Making and Spreading Viruses • Stealing Corporate Data • Destroying Corporate Data • Denial of Service Attack (DoS) • you can shut down cnn.com by quickly hitting it with thousands of bogus requests • Social Engineering • Using non-technical skills to gain access to private information.

  9. Legal Issues Computer Crime • Most corporate computer crime is done by employees • 58% unauthorized employees • 24% authorized employees • 13% outside hacker • 5% other

  10. Image Files 24-bit image - uncompressed • 640 x 480 pixels = 307,200 pixels per image • 307,200 x 3 bytes-per-pixel = 921,600 bytes Average JPEG Image • 800 x 600 pixels = 85,000 bytes • compressed, so quality of details is pretty low • about 750 medium-quality jpegs will fit onto a CD

  11. Image Files http://photo.net/equipment/digital/basics/

  12. Image Files http://photo.net/equipment/digital/basics/

  13. Exam Next Week • Format: • lots of multiple choice • some short answer • Types of Questions: • lots of advantages and disadvantages • lots of definitions • lots of general concepts, trends over time, etc. • some compare and contrast • no dates

More Related