Protection against Virus
Viruses are a serious threat to all computer systems, especially those linked to networks or to email or internet services. Antivirus protection programs are an essential part of any computer system.
What is a computer virus?
These are programs developed by unscrupulous or malicious programmers who are able to perform different functions, both benign and malignant, in an "infected" computer.
Benign viruses can simply perform harmless (but usually annoying) functions such as displaying animated messages. Malignants can alter programs or information, destroy files or cause massive amounts of emails to be generated, threatening the stability of networks by saturating them with information.
Viruses are spread by transferring infected files from one computer to another. This can happen by transferring files to removable disks, accessing or downloading files from the Internet or a network or through files sent by email. Viruses can be executable files or in other formats, such as word processor that contain macros. Running these executable files or opening those containing infected macros can activate the virus that can cause considerable damage.
Some viruses attack email programs. When entering the address list stored by the user, the virus can be reproduced by sending copies to all of them. The multiplying effect of this strategy means that a virus can spread to a large number of computers around the world in a very short time.
Computers attacked by a virus can experience very serious damage, and much information can be lost or put at risk. In the worst cases, the hard disk of the computer can be unusable and lose all the information it contains. In these cases, the best thing to do is reformat the hard drive (clean it and start over) and reload all the necessary programs and backups.
The possibility of a virus attack is a powerful incentive to carry out periodic and exhaustive backups of programs and information. For more details on backup procedures (see Ensuring Availability of Information).
Antivirus programs
The way to protect a system against a virus attack is by using a protection program. Antivirus programs are designed to operate permanently, so the user is usually not aware that at least a problem arises. Protection programs are designed to recognize known viruses and prevent them from generating their effects.
In addition, as new viruses appear frequently, protection programs are also designed to identify their possible activities and prevent them from operating. For example, a typical antivirus program will place a "label" on each known executable file on each computer. If an unknown executable file tries to execute a program, the protector will activate an alarm and ask the user if it wants it to operate. If the user confirms that the executable file appears to be a virus, the protection program can remove it from the system.
Unfortunately, since new viruses adopt new modalities, protection programs have to continually go after them and try to catch every new virus identified. As a result, protection programs have to be updated frequently to ensure that they are able to identify and manage the latest known viruses. A structured plan to update antivirus programs can be part of the technological strategy of an electoral body.Safe computer practices
Regardless of the presence of protection programs, some viruses can go unnoticed and infect a computer system. In order to prevent this possibility, information must be continuously supported and users must apply safe practices on the computer.
Due to the possibility of viruses, all users must know the necessary steps to avoid them. First, antivirus programs must be installed and in operation, not deactivated. System administrators will often want to monitor the operation of these programs to ensure that users have not disabled them or, better yet, users should be prevented from doing so.
Second, users should be careful when opening files and especially to run executable programs if they are not sure they have been sent by a known and reliable source. Even emails sent by acquaintances may be suspect, since viruses can control a user's mailing list and send messages using any name on that list.
Viruses sent by e-mail can be accompanied by convincing messages that encourage users to open infected files. Users should be careful in these cases.
If users are not sure that the programs or files they have received are reliable, they should not open them. In these cases, they can be eliminated (you also have to remove them from the recycling tray). If the user is not sure, the sender can be contacted to verify that the file or program is genuine.
In case of doubt, it is recommended that the user contact a technical assistant or a help instance.
Ensure the Reliability of Information
Many electoral computer systems exist basically to store and make use of information. Voter lists, electronic voting systems, results programs and personnel databases and materials are based primarily on information. Ensuring its reliability is of the utmost importance. A computer system that relies on information is as good as the information it contains.
There are several measures that can be adopted to ensure the reliability of the information used in the computer systems for electoral use.
Use of reliable information sources
The first step is to use reliable methods of information gathering. This means that the information must be obtained from reliable sources, preferably from primary sources. For example, the personal data of the voters will be more precise if they are obtained directly from the electors themselves and not from indirect sources such as known or databases of organizations of dubious quality. The most precise election results will be those obtained directly from the offices or instances in charge of counting and not from media reports, electoral observers or political parties.
Methods of information captureThe next step that has to be considered is the method by which information is captured from a source. It can be captured in various ways: on paper (in a handwritten manner, using legible computer or typed marks) by telephone (after which the information is normally written or entered into a computer by an operator), by direct inquiry (the procedure final is the same as in the previous modality), by customers who directly enter the information via the Internet or an "electronic kiosk" (using online electronic formats), through an electronic voting device, etc.
Some forms of information capture are more reliable than others. Manuscript formats are probably the most prone to error, since handwriting can often be difficult to read or decipher. To reduce the difficulty of reading handwritten texts, people filling in the forms can be asked to write clearly in capital letters and in black or blue ink. You can also achieve a clear writing by printing formats designed for users to write a letter or number in each bounded space. If it is possible to preprint any known information about the client in the format, the required handwritten text will be reduced.
When the information is received verbally by an operator, the proper training of procedures can ensure that it correctly captures all the information. For example, you can repeat to the client the information you have provided to verify that it is correct and spell the words when necessary.
When information is captured using optical brand readers, the most useful instructions for users should be clear and unambiguous and the methods used simple and logical. Forms that include optical mark recognition devices, such as barcodes, can be used to simplify the input of information and increase levels of accuracy. Bar codes can be used to identify the type of formats used, where they were obtained, what their number and other data are. When the formats contain pre-printed information about the client, the bar codes can be used to allow the computer to accurately capture the identity of the client when entering the information.
The information captured electronically, when it is typed directly by the client in a computer system linked to the Internet, can be more reliable than that which is retrieved from manuscript formats or from information taken orally, since the client is expected to know exactly how he should appear your information. However, this information is only as reliable as the client is required, the quality of the information provided in this way can be variable.
Training of the personnel in charge of the capture
Staff needs to be trained in techniques designed to optimize accurate capture of information and to ensure a safe work environment. For example, periodic breaks are necessary to prevent physical fatigue. The furniture and computer equipment can be located to ensure good posture and solid ergonomic practices. Distractions should be avoided or minimized. For example, allowing staff to engage in conversations while capturing information can affect accuracy.
Verification of information
One of the best ways to guarantee the accuracy of information is by applying verification techniques. The most common technique (when information is entered into the computer from a documentary source) is to enter the information twice, using different operators. The results of the two captures are compared by the computer, indicating any variation and requiring the presence of a supervisor to make any necessary corrections. This technique usually offers high accuracy rates.
The double capture of information can also be used to identify the capturists who are not reaching high levels of precision. When low performers are identified, this may indicate that more training is required or that the capturist is not appropriate for that type of work.
The information can also be verified by entering it only once and requiring another official, perhaps a supervisor, to verify it on screen or in a printed medium to confirm that it is correct or make the necessary corrections.When using any of the above techniques, it is desirable that the information be captured only once and then recaptured or verified by a different person, because people may incur systematic errors. However, two people are less likely to commit the same systematic errors. It is easier for a second person to identify the mistakes made by someone else.
It is also possible that the format design causes users or capturists to make systematic errors. If a significant number of similar errors are noticed when the information of a format is registered, the design may be inadequate. Redesigning the format can help reduce errors.
The information can also be verified using review mechanisms integrated with the automated capture process. For example, a database containing private addresses can include a list of all valid addresses. The system can be programmed to ensure that only valid addresses are accepted. This verification technique does not necessarily guarantee that the correct addresses are captured, but that they are all at least real.
In the same way, arithmetic review systems can be installed to capture numbers. For example, a format may require users to indicate the total of a sum. The review system will indicate when there is a discrepancy in the catch, inducing the capturist to review and correct the information.
Arithmetic or logical tests can also be used to verify the entry of information. For example, if an operator is entering information about the information sites, the system can be programmed to question any result that shows more votes than registered voters at the respective table. The trends can also be calculated by a computer system in such a way that any result that differs from the trend by an unusual number can be identified and answered.
Ensure the reliability of the information after it has been captured
Once the information has been incorporated into a computer system, it is important to store and maintain it safely, as well as to use it in such a way that its integrity is not compromised. These issues are addressed in Ensuring Availability of Information.


0 komentar:
Posting Komentar