You are on page 1of 19

COLEGIUL TEHNIC DE COMUNICATII

NICOLAE VASILESCU KARPEN

EXAMINATION PAPERWORK
FOR
LINGUISTIC COMPETENCE

TEACHER,

STUDENT

GURLUI ANCA

VASILESCU SILVIU

BACAU 2009

Security
-New Human Obsession-

Contents
Argument....page 4.5.
Chapter 1
1.1. Security Solutions .page 6.7.
1.2. Management systems of buildings.page 7.
Chapter 2
2.1. Auto Security.........................................................page 8.9.
2.2. European New Car Assessment Programme.....page 10.11.12.
2.3. Mercedes S-Guard.... page 13
Chapter 3
3.1. Internet security....page 14.15.16.17
3.2. Copyright..page 17.
Biographypage 18.
Appendage..............page 20.

ARGUMENT
3

Financial crisis threatens world security


Deterioration of the global economy caused by the financial crisis is the
biggest threat to global security. Poverty, which will hit tens of millions of
people could lead to the emergence of social movements extremely violent. And
they might stay only through intervention of the authorities, as violente.Oxford
Research Group has recently completed a report evaluating the security in the
world. According to him, the world financial crisis will cause a decrease in the
level of living for hundreds of millions of people, fueling widespread discontent.
Worse is that this situation will lead to the emergence of radical social
movements and violent to be controlled only recourse to force. Cancellation of a
large number of jobs will increase poverty, will increase the number of disease
and will increase the number of people who can not feed adequately, especially
in developing countries. Specialists from the Oxford Research Group argue that
all these things will influence negatively the social security systems, which will
no longer face. Moreover, according to the report conducted by Oxford Research
Group, there are already indications of increased social disorders in China and
maoiste rebellion in India. The report, Paul Rogers, consultant Oxford Research
Group and professor at Bradford University, states that decisions taken at the
next world will be decisive in terms of world security. The choice that we will
face in coming months will determine if the world becomes more peaceful or
less peaceful in the next ten years. Either respond as a global community or as a
group of rich and powerful countries. Should be taken the opportunity to
introduce fundamental economic reforms, to cancel divisions poor / rich, were
widened so much in the last three decades, he said.
Terrorist threats
Another threat to global security, caused by financial crisis, it's terrorism.
Heads American intelligence services fear that the deteriorating global economy
will be weak Western allied governments and the ability of the United States
responded to terrorist threats. Mike McConnell, the chief U.S. intelligence
community, said recently that latent problems and trends, in particular regional
instability already existed before, but now are accelerated by the current global
financial crisis. Under its current terms will be favorable for the production of
terrorist attacks by large, committed with chemical, biological weapons and
perhaps nuclear. Also, McConnell believes that because of all the crisis, the risk
of conflicts worldwide in the next decades is extremely high. Thus in 2025, the
likelihood of conflict between countries and of civil wars will be higher, said
chief U.S. intelligence community. Not only the heads of information warns
about the possibility of committing terrorist attacks. Several officials, who
4

wanted to preserve their anonymity, and independent political analysts said,


quoted by the Washington Post newspaper that the economic recession has
increased short-term risks of terrorist actions. According to their U.S. allies such
as Pakistan or some governments in the Middle East could be threatened, that
Western countries would be forced to reduce their defense budgets, the
international information and assistance.
Pope forecast
Amazingly in the first person who predicted the current crisis was not an
economic analyst, but Pope Benedict XVI. This was disclosed by italian
minister of Finance, Giulio Tremonti, who quoted a prophecy made sovereign
pontiff during which he was cardinal. According to Bloomberg.com the site,
during a speech held at the University Cattolica in Milan, Tremonti said that
predict that the economy will crash ungovernable because of its rules can be
found in an article written by Cardinal Joseph Ratzinger in 1985. In the article
titled Market Economy and Ethics, the current Sovereign pontiff wrote as a
decline in the ethical principles that may, in reality, the laws of the market to
crash. On the other hand, Pope Benedict declared after a month in a speech that
the disappearance of money does not mean anything and the only solid reality is
the word of God. Also, the official publication of the Vatican, the Osservatore
Romano, criticized the free market that has grown too much and wrong in the
last two decades.

Chapter 1
1.Security Solutions and Management of Buildings
5

1.1. Security Solutions


We all systems that provide surveillance
and control activities within a defined area,
namely:
Detection systems to brake an entry - protection
against unauthorized accesses
detection and fire alarm - fire protection
systems with closed circuit television monitoring activities
Access control systems - Authorization
displaced persons.
1.1.1.Detection system against forcing locks to commit a crime
Location and scheduling systems for detection and alarm at braking an entry are
depending on the target to be protected, specific activity, the work requirements
and plan beneficiary security objective. The detection and alarm for braking an
entry to protect unauthorized access to objective, prerecorded messages to preset
numbers, send the information systems at the base.
1.1.2. Fire detection and alarm
Fire protection for any building has the following objectives: protection of
human life and assets, preventing disruption of activity.
1.1.3. SYSTEMS closed circuit television
Security of the objectives can be achieved without an effective video
surveillance, allowing both real-time monitoring of suspicious persons and
events, and recording video images in order checks and provide further evidence
in court
1.1.4. SYSTEMS CONTROL ACCESS
The purpose of access control is to select and order the movement of persons
within the area defined by verification of authorization crossing each person
requesting access to the area. With access control system can create a data base
for timekeeping.
To implement these systems have the following certifications:
Operating license for companies specializing in alarm systems against braking
an entry, authorization for the design, manufacture, installation, maintenance of
alarm systems against braking an entry and consultancy in the field
Certificate of certify for verification, maintenance and repair systems,
installations, devices and signaling devices, alarm and alert in case of fire.
1.2. Management systems of buildings
The Building Management Systems (BMS) includes a wide range of
technologies for systems management and power control systems.
6

The functions of these systems is to control, monitor and optimize all of a


building:
heating and ventilation (HVAC - Heating Ventilation and Air-Conditioning)
lighting
access control and other services.
Solutions Building Management Systems (BMS) that we propose, in order
to efficient business you are and mark Delta Controls include controllers for
HVAC, lighting, access control, together with software package management.
Main advantages:
programming and control installations in a building can be centralized in order
to reduce maintenance costs and a maximum comfort.
integration with metering systems (heating, power control, etc.) - allows the
management and cost allocation breakdown of consumption for each consumer
(of building space)
the BMS-Delta Controls using existing IT infrastructure in a building, specific
elements in the interconnection network is Ethernet realised both through IP
protocol as well as through other specific protocols (BACnet).
Specialized services for the design, installation and management of such
systems are backed by our specialists and constantly supervised by experts from
Delta Controls products.

Chapter 2
2. Auto Security
Automotive invention and development of extensive systems of roads and
7

related infrastructure have a major influence in development of human society


with more freedom of movement and mobility. But the benefits deriving from
daily use of vehicles are in contradiction with the consequences resulting from
accidents caused by traffic.
Nowadays traffic safety has become an important issue (both in terms of social
and economic) that concerns the highest authorities [2].
Currently there are two major trends for the proposed development of
safety systems:
- Passive safety systems (which react in different dangerous situations to help
the driver to overcome or to protect occupants in case of accidents - eg. Seat
belts, air-bag systems to anti-wheel ABS brakes, etc.. );
- Active safety systems (the role of preventing collision between two vehicles eg. ACC system for adjusting the distance between driving vehicles).
The ABS (English anti-lock braking system Antiblockiersystem or German)
is a system for motor vehicles which prevents wheel lock during braking. This
has two advantages: allows the driver to maintain steering control during
braking and shortens the braking distance.

ESP (Electronic Stability Program) is one of active safety systems for


automobiles. Name ESP is a registered trademark of Robert Bosch GMBH,
other companies using different acronyms, such as ESC (Electronic Stability
Control), DSC (Dynamic Stability Control) and TCS (traction control system).
This is to ensure stability in the car turns, brakes preventing skid by
selective and independent wheels, depending on the vehicle's lateral acceleration
and steering wheel rotation. At the same time can be reduced by stopping the
machine acceleration power to fuel the engine, driver sensing that gas pedal no
longer works. ESP system, called by some manufacturers DSC is based on
several sensors that detect differences in rotational speed between front and rear
8

wheels and the lateral movement of the chassis from the path of the required
direction. ESP response is very prompt, miliseconds order.
Operation ESP is felt suddenly turns addressed, at times the path of the
vehicule tends to escape control, especially on surfaces with low strength (snow,
wet asphalt).
EBD = Electronic Brake Force Distribution
Apply correct braking force on each wheel to compensate for the different
distribution of the load on wheels during intense turns or braking in a straight
line.
2.2. European New Car Assessment Programme
The European New Car Assessment Programme (Euro NCAP) is a
European car safety performance assessment programme founded in 1997 by the
Transport Research Laboratory for the UK Department for Transport. The
organisation is now backed by the European Commission, the governments of
France, Germany, Sweden, The Netherlands and Spain, as well as motoring and
consumer organisations in every EU country.[1] [2] Euro NCAP publishes safety
reports on new cars, and awards 'star ratings' based on the performance of the
vehicles in a variety of crash tests, including front, side and pole impacts, and
impacts with pedestrians.
The frontal tests are performed at 64 km/h (40 mph) into an offset
deformable barrier. The side impact tests are performed at 50 km/h (31 mph),
but the side impact pole test is performed at 29 km/h (18 mph). The pedestrian
safety tests are performed at 40 km/h (25 mph).
Euro NCAP frontal test
Euro NCAP side impact
Euro NCAP pedestrian test
Euro NCAP side impact, pole test
Euro NCAP adopted the rear-impact (whiplash) test as part of its new crash-test
regime from January 1 2009

Euro NCAP provides motoring consumers - both drivers and the


automotive industry - with a realistic and independent assessment of the safety
performance of some of the most popular cars sold in Europe.

If you want to know the safety performance of your current or future car this is where to look!

Adult Occupant Protection


Adult Occupant Protection was, with Pedestrian Protection,
the first rating introduced by Euro NCAP. Points are awarded
from the frontal, the side and pole impact tests. Modifiers are
also given to extend the assessment to cover different sizes of
people in a variety of seating positions, in particular for the
knee contact area. The Adult Protection score is completed
with the result of the Whiplash test that is carried out
separately on the driver or passenger seat.

Child Occupant Protection


Euro NCAP has carried out a child occupant safety assessment
since its very first test to ensure that manufacturers take
responsibility for the children travelling in their vehicles. In
November 2003, Euro NCAP introduced a child occupant
protection rating to provide clearer information for consumers
about the results of these tests. As part of this assessment,
Euro NCAP uses 18 month old and 3 year old sized dummies
in the frontal and side impact tests. As well as studying the
results from the impact tests, Euro NCAP verifies the clarity
of instructions and seat installation in the vehicle to ensure
that the child seat can be fitted safely and securely.

10

Pedestrian protection
Euro NCAP believes more effort by manufacturers in
Pedestrian Protection would save the lives of many
pedestrians and negate the emotional trauma
encountered by many drivers every year as they live
with the consequences of injuring or fatally wounding a
pedestrian. With inclusion of the pedestrian score into
the overall rating, Euro NCAP aims to encourage
improvement of vehicle performance in this
assessment. Euro NCAPs results in this rating are
achieved through leg form, upper leg form and
child/adult head form testing.

Safety assist
The introduction of Safety Assist allows Euro NCAP to
consider driver assistance systems and active safety
technologies. These technologies play an increasingly
important role in accident avoidance and injury
mitigation. Euro NCAP rewards manufacturers for the
fitment of electronic stability control, in addition to
points given for the presence of a speed limitation
device and intelligent seat belt reminders.

By law, all new car models must pass certain safety


tests before they are sold. But legislation provides a
minimum statutory standard of safety for new cars, it
is the aim of Euro NCAP to encourage manufacturers
to exceed these minimum requirements.
This section of the site contains an explanation of how
Euro NCAP's different crash tests are performed and
how our safety ratings are reached.

11

2.3. Mercedes S-Guard, armored car of the heads of state


Mercedes-Benz hosted in
a copy stand S-Guard. This
model is based on S-Klasse and
is an armored car, used by over
90 governments around the
world. S-Guard is produced at
the Mercedes Sindelfingen plant
and uses the integrated
protection in bodywork standard
S-Klasse. Thus, to obtain a
better dynamic vehicle weighing
total less. The car weighs 4200
kg and is equipped with the
engine used on the S600, a V12 bi-turbo de 517 CP. For a better
maneuverability, rims have been fitted with run-flat tires Michelin PaX,
developed especially for the S-Guard. The armourd car has a standard called
B6/B7, which means that resist weapons military small caliber. May explained,
speed bullets drawn from these weapons is double compared to those from the
gun. S-Guard resists even the fragments of grenades or other explosives. In
addition, S-Guard is equipped with a variety of auxiliary systems, as well as
fresh-air ", which provides
air passenger cure
t in the case of a toxic gas
attack, and a pneumatic
system that automatically
raise the windows even if
your database driver is
different.
12

Chapter 3
3.1. Internet Security
- INFORMATIC VIRUSESInformatic-viruses are hard to detect microprograms, hidden in other
programs, waiting for a favorable moment to cause failure of the computation
(blocking its unexpected messages or commands, and other destructive actions).
One can appreciate that a computer virus is a destructive action microprograme
located mainly in internal memory, where waiting for a signal to start and work.
In the most general viruses are divided into:
Virus Hardware
Virus Software
Viruses hardware are rare, they are usually delivered with the equipment.
Most viruses are software created by experts in science, skills and very good
knowledge of computer systems, in particular how the software works basic and
applied.
In terms of capacity multiplier viruses are divided into two categories:
Viruses that replicate, infect and destroy
Viruses that do not replicate, but they infiltrate the system and cause damage
without leaving traces (Worms).
Depending on the type of destruction in the system are distinguished:
Viruses that cause destruction programs that includes
Viruses that cause no damage, but with the inconvenience of calculation occurs
by slow speed, the lock keypad, display messages or images unjustified.
Viruses with high power of destruction, which causes the whole system for
incidents such as the destruction of sheet allocation of files on your hard disk,
changing the content root directory, full allocation and existing information
irretrievable.
In the user manual of the MS-DOS, Microsoft viruses divided into three
categories:
Viruses that infect the system boot
Viruses that infect files
Trojan Horse Virus
However a more detailed classification of the virus would look like this:
Armmati - a form of recent viruses that contain procedures involving
disassembly and analysis by an antivirus, publishers are forced to redouble their
efforts to develop an antidote ex. "Whale".
Autoecriptors - includes in the body of their sophisticated encryption methods
to make detection very difficult. Fortunately, can be discovered by a routine that
incorporates the decryption example. "Cascade".
13

Comrades - are a particular advantage of the DOS, which run programs. Com
before those. Exe. Original file does not change and can pass the test antivirus
professionals. Once launched the file, what file is run. Com, but the file. Exe
infected. This lead to the propagation of viruses and other applications.
slip (stealth) - these viruses has masks this by hijacking disruptions DOS.
Thus, the dir command does not allow the observation that the executable file
size has increased, so is infected. Example: "512", "Atheus", "Brain,"
"Damage", "Gremlin", "Holocaust" and "Telecom".
Multiple infection - a few years ago viruses were distributed in two well
separated groups: those that infect the programs and those operating on the boot
sector and partition tables.
Poliform - are the most sophisticated viruses of the meet so far. An "engine" to
allow their mutations in thousands of different versions of code. Example:
"Andre", "cheeba", "Dark Avenger", "Phoenix 2000", "Maltese Fish" etc..
Viruses have the boot sector of partition tables - it infects and / or other of
these critical areas of floppy disks or hard disk. Infected boot sector is dangerous
because when you start the computer code specifically MBP (Master Boot
Program) per diskette of execution before DOS. If there is a virus present, could
not locate. Partition tables contain information about the structure of the disc,
which we can be contaminated just broken. Most current antivirus can detect an
infection in MBP, proposing in general suppression of MBP and replacing it
with healthy oforma. Example: "Alameda", "Asthar", "Blood," "Cannabis",
"Choos".
Scanning-apply preventive processing files from outside, so it is useful in
the primary phase of virus propagation. It can rescue even if applied later on a
clean system diskette in active phase because in many cases can recover the files
infected.

Conclusions:
scope of action, memory and files of interest;
protection occurs at the first contact with any file;
allows disinfection;
do not detects virus in November, any new virus must be introduced in the
program list of virus scan;
type of scan increases with increasing number of viruses and looking for the
number of protected files;
there are false alarms if the signature itself is too short;
uses computer memory as a resource;
automatically calling a tsr;
14

Protection programs antivirus programs are intended to achieve


simultaneously the following activities:
prevent contamination;
detection of virus;
virus removal, with restoration of the initial context;
In general there are two types of antivirus software:
programs to check the files to find texts or inappropriate signatures of
unknown viruses;
memory resident programs which interpret or special instructions that seem
dubious.
In this category,programs include checking the type SCANxxx where
specified by xxx associate a version number, eg SCAN86, SCAN102,
SCAN108, SCAN200.
These programs check the internal memory first and then the disc drive
specific, displaying on the monitor possible found and known viruses in that
version. After this verification the user vsa try feeding virus detected through
CLEARxxx programs, by the name itself, using this program there is certainty
cleaning viruses, Thanks be to the non-recognition, or a location in places that
can not be spotted.

Anti-virus programs:

1.AVAST
2.Kaspersky
3.Sophos
4.Avira
5.MC Afee
5.Nod32
6.Bitdefender
7.CA Antivirus
8.Norton
9.Trend Micro
10.Panda
11.F Secure

15

3.2. Copyright is a form of intellectual property which gives the creator of an


original work exclusive rights for a certain time period in relation to that work,
including its publication, distribution and adaptation; after which time the work
is said to enter the public domain. Copyright applies to any expressible form of
an idea or information that is substantive and discrete. Some jurisdictions also
recognize "moral rights" of the creator of a work, such as the right to be credited
for the work.
An example of the intent of copyright, based in the United States Constitution, is
simply to promote the progress of science and arts by securing for limited times
the exclusive right of the creator.
Copyright has been internationally standardized, lasting between fifty to a
hundred years from the author's death, or a finite period for anonymous or
corporate authorship. Some jurisdictions have required formalities to
establishing copyright, but most recognize copyright in any completed work,
without formal registration. Generally, copyright is enforced as a civil matter,
though some jurisdictions do apply criminal sanctions.
Most jurisdictions recognize copyright limitations, allowing "fair" exceptions to
the author's exclusivity of copyright, and giving users certain rights. The
development of the Internet, digital media, computer network technologies, such
as peer-to-peer file sharing, have prompted reinterpretation of these exceptions,
introduced new difficulties in enforcing copyright, and inspired additional
challenges to copyright law's philosophic basis. Simultaneously, businesses with
great economic dependence upon copyright have advocated the extension and
expansion of their copyrights, and sought additional legal and technological
enforcement.

16

Biography
http://emanoil-gojdu.infonews.ro/article124782.html
http://auto.howstuffworks.com/auto-parts/brakes/brake-types/anti-lockbrake.htm
http://www.WorldCarFans.cm
http://en.wikipedia.org/wiki/File:Euroncap_front_impact.png
http://upload.wikimedia.org/wikipedia/commons/f/fc/Euroncap_side_impact.pn
g
http://www.google.ro/search?hl=ro&q=mercedes+s-klasse+S-Guard&btnG=C
%C4%83utare+Google&meta=
http://referate.rol.ro/referate/startdown/733/
http://www.sistec.ro/solutii_servicii.php?fid=41
http://referat.clopotel.ro/Virusii_informatici-10485.html
http://www.x1.ro/antivirus.html
http://ro.wikipedia.org/wiki/Antiblockiersystem
http://ro.wikipedia.org/wiki/ESP
http://www.e-referate.ro/referate/Apararea_drepturilor_de_autor2007-0306.html
http://ro.wikipedia.org/wiki/ESP
http://www.ereferate.ro/referate/Securitatea_in_internet_si_elemente_de_etica2007-0502.html
http://referate.rol.ro/referate/Download/Diverse//ConflictulsiSecuritateaUmana
http://en.wikipedia.org/wiki/Euro_NCAP
http://ro.wikipedia.org/wiki/Atentatele_din_11_martie_2004_de_la_Madrid
http://www.einformativ.ro/articol/Psihologie/Articole/388/Nevoilefundamentale-ale-omului/
http://www.zelea-codreanu.com/to%20root%20dupa%20aranj
%20headings/r_Cuvantul_Legionar,%20Diverse/11%20septembrie%202001Cacealma%20terorista%20SUB%20BAGHETA%20CIA.htm
http://www.zelea-codreanu.com/to%20root%20dupa%20aranj
%20headings/r_Cuvantul_Legionar,%20Diverse/11%20septembrie%202001Cacealma%20terorista%20SUB%20BAGHETA%20CIA.htm
http://ro.wikipedia.org/wiki/Atentatele_din_11_martie_2004_de_la_Madrid
http://emanoil-gojdu.infonews.ro/article124782.html

Appendage
17

Front impact

Side impact

18

Pole impact

Pedestrian impact

19

You might also like