domingo, 29 de julio de 2018

Deliberate Act of Trespass


what is the deliberate act of trespass?



It is the transfer of information of differnt type of a determined type of apparatus to another similar or different type. Today one of the simplest and most useful processes to perform with electronoc appliances and many of the possibilities are specially adapted to facilitate the task to the average user.


This transfer is always data and these can be represented in different styles either in multimedia material (audio or video), texts, images, among others.
Normally, the transfer process can be given in three basic ways:
  • Through a network system (INTERNET)
  • Through a port (USB)
  • Through different storage media (CD, DVD, ETC.)



Depending on the quality of the devices or the method chosen, the speed of the transfer may vary. On the other hand, the devices involved in the process must have the same protocol language that makes them compatible.



In this sense, having computers in a network allows access from one device to information stored in another device.

In the case of USB ports, these are usually used with external devices such as cell phones, pen drivers, printers, other computers and storage devices

The transfer can also occur with or without the need for cables.

If one needs cables to carry out this process, these should be UTP cables, optical fiber or coaxial cables.

Wireless transfers are basically satellite, with infrared systems, wi-fi technology, bluetooht, etc.

acts intended to destroy an information asset and, ultimately, damage the image of an organization
example:
hackers that access a system and damage or destroy critical data



The difference with a general purpose communication protocol is that the file transfer
protocols are not designed to send arbitrary data or facilitate asynchronous communication, such as Telnet sessions. Its objective is only to send the sequence of bits stored as a single unit in a file system, in addition to all metadata, such as file name, file size, date and time.

In Computer Science, "file transfer" is a generic term to refer to the act of transmitting files through a computer network. Although the term is usually linked to the File Transfer Protocol (FTP), there are many ways to transfer files over a network. The difference with a general purpose communication protocol is that the transfer protocols Files are not designed to send arbitrary data or facilitate asynchronous communication, such as Telnet sessions. Its objective is only to send the sequence of bits stored as a single unit in a file system, in addition to all metadata, such as file name, file size, date and time.

In Computer Science, "file transfer" is a generic term to refer to the act of transmitting files through a computer network. Although the term is usually linked to the File Transfer Protocol (FTP), there are many ways to transfer files through a network.

File transfer can take place on a variety of levels:

  • Transfers of transparent files through network file systems.
  • Transfer of explicit files from dedicated file transfer services, such as FTP or HTTP.
  • Transfer of distributed files between point-to-point networks.
  • Transfer of files in instant messaging systems.
  • Transfer of files between computers and peripheral devices.
  • File transfer over direct modem or serial links

There are two types of file transfers:

  1. Transfer of files «Pull-based»: the receiver initiates a request for file transmission.
  2. Transfer of files «Pushy-based»: the sender initiates a request for transmission of files.

No hay comentarios.:

Publicar un comentario