Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
lab1 Shakenova Aigerim CSSE105R.docx
Скачиваний:
5
Добавлен:
25.02.2016
Размер:
4.75 Mб
Скачать

A Little Extra:

Locking is useful when the user must leave the workplace without closing your open windows or turning off the computer (break, emergency call, etc.), and in his absence no one was able to take his machine and the data on it. Obviously, success locking is impossible without a password, which must first be created for all user accounts.

When you lock the network workstation it is sufficient without closing working windows, simultaneously press the keys Ctrl, Alt, Delete and in the window Windows Security that opens, click the Lock.

After the lock screen is automatically restored to the form in which it was before the lockout.

Can be blocked with a password screen saver at a specified time since the screen saver is active. Saver password matches the password of the user who is logged on the computer. If the logon password is not used, you can not set the screen saver password. When you put your computer in sleep mode also blocking can occur if used logon password.

There is also an Internet tools that locks the desktop: Black Screen, Winsecure-IT, Access Lock, System Locker (and others) that protect the display screen from the curious eyes of unauthorized users.

Basics of Informational Security (iitu/Fall, 2012)

Lab 1 – 2 (? points)

Your Task:

  1. Absorb the funds of systematic data protection: protection of applications (Word, Excel, Access) from the network and local access.

  2. Absorb the funds of password protection of office applications.

  3. Master the standard tools of hiding data fragments in office applications.

  4. Complete the tasks.

Useful Information:

  • At the stage of saving Word, Excel, and Access files possible to organize systemic protection of folders containing these files. This technology is implemented directly in the file saving windows, if the user is endowed with the appropriate rights.

  • Besides these security measures are common to all applications, MS Office, in the DBMS Access are implemented specific protection measures against unauthorized access to specific database objects (tables, forms, queries, reports, macros, database) with differentiation on the user and object permissions.

Sample Solution

  1. Password protection.

Word and Excel files:

  • in the window Saving the document go to Tools menu, then Security Options.

  • in paragraph a Password to open the file set the password.

  • the next time when you will load the document, the system will ask you the password.

Access files:

  • after creating a database go to Tools / Protection / Set the database password.

  • create a password.

  • the next time the base of the system will ask the password.

To remove the password in the Access is enough:

  • go to Tools / Protection / Remove Database Password.

  • enter the password.

  1. Hiding data fragments.

To hide data (in specific case of the table) in Excel is enough:

  • hide selected parts of your document by right-clicking (dynamic memory), select Hide.

  • hide columns or rows: the menu bar, select Format / Row / Hide or Format / Column / Hide.

  • hiding books Excel: the menu bar select Tools / Protection / Hide.

  • hiding sheets: in the menu bar select Format / Sheet / Hide.

For the map (recovery) previously hidden fragments must:

  • rows, columns:

  1. unprotect the sheet, if it was previously installed.

  2. identify two adjacent columns or two adjacent lines between which were hidden, accordingly, columns or rows.

  3. put your mouse over the border between the selected columns (rows) in the frame of the working field by achieving the cursor changing shape (double arrow).

  4. Double-click the left mouse button.

  5. sheets: in the menu bar select Format / Sheet / Show.

  • To protect a worksheet in Excel enough:

  1. in the menu bar of open window select Tools.

  2. in paragraph Protection enter the password and confirm it.

  • To hide data (in specific case of the table) in the Access enough:

  1. Columns: select the column and in the menu bar select Format / Hide Columns.

  1. Tables: select the table and call the popup menu and in the menu select Properties.

  2. activate Hidden check box

To display:

  • columns:

  1. in the menu bar select Format / Show columns.

  2. Then you will see a window. There is necessary to put tick the box next to those columns you want to display.

  • Tables:

  1. in the menu bar select Tools / Options.

  2. select the View tab.

  3. Put a flag to Hidden Objects.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]