Best scientific research 2022
Download 1.94 Mb. Pdf ko'rish
|
1-1-PB
BEST SCIENTIFIC
RESEARCH - 2022 99 The use of cyberterrorism is to carry out threatened acts of violence that result in death or serious bodily injury in order to achieve political and ideological gains over the Internet. Sometimes nu is considered an act of internet terrorism. Cyberterrorism can be defined as the malicious use of computers, networks, and the public Internet to cause destruction and harm to individuals. A virus program can destroy the integrity of data on a computer or them will be deleted. For the first time, virus programs were developed in the United States released, because it was in this country that personal computers were widespread. First There are virus programs produced to disturb the user's peace of mind and was aimed at touching a nerve. But then they do their own harm accepted as a goal. At the moment, the whole world is about 200,000 There are more virus programs. They are computer viruses that are on the computer damage data or reduce computer performance sends One of the famous "doctors" D.N. Lozinsky compares the virus to a secretary. If we assume an orderly secretary, he comes to work and sees all the things on his desk - papers and letters. He duplicates one sheet and puts one copy for himself and the other on the table next to him. The secretary at the next table also duplicates at least two copies and transfers it to another secretary. As a result, the first copy in the office becomes several copies. Some copies can multiply and move to other tables. Computer viruses work roughly like this, only with paper instead programs, the secretary is a computer. If the first command is "copy-copy", the computer will do it and the virus will spread to other programs. If the computer runs an infected program, the virus can spread to other programs and take over the entire computer. |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling