ÓÊÄ 004.056.57

Modern information technology/4. Informational safety.

Begalin A.Sh., senior teacher,

Kostanay state university named after A. Baitursynov

Stavrianidi P.M., senior teacher,

Kostanay engineering economic university Myrzhakyp Dulatov

Suhov M.V., c.t.s., senior teacher,

Kostanay state pedagogical institute

REALIZING SYSTEM OF PROTECT INFORMATION IN

ELECTRONIC EDUCATIONAL PROGRAM

Protecting electronic facts educational publication and educational programs may be realized different ways. Many people  used just management of program by delimitation rights users.

Others used for keeping base facts, not that usual text tiles. Very other by using many users electronic educational regime administrational for keeping logins and password used usually texts files without paroles *.txt, *.ini, *.dat or files base facts *.db, *.dbf, *mdb. And few people think about that they must protect them from unsanctioned access. Of course other if electronic book working in net, charge with server here problem of protect will be less actual from local version.

How better protect facts electronic book by local used from possibility rewrite, peep, find and look right answers, come in by somebodies logins? In may opinion here some ways how it do:

-       Realize many users regime with delimitation rights of users;

-       Using regime of administrational;

-       Facts of education, register users may he save in cipher files or base facts by closed  paroles;

-       Materials of electronic books (lections, text and practical exercises, question) many be closed from un mediocrity access by way of ciphering or with parols;

-       Using complication parls.

For additional protect may used:

-             Ciphering base of facts;

-             Using files of unstandart format;

-             Ciphering all texts exercises and answers, and other materials (lection, practical exercises).

Examples of using different ways of protect.

Registration of parols and manyusers regime.

Examples. Registration users fill in three margins. Name, surname, group and twice for shun mistakes come in parole. Facts users and his parole saved in base of fact which protectbyparol. Paroles have only teacher and he realize administration base. In registration don’t admit saved wih unfilled margins. Name, surname, group and if filled on there margins exists in one tally sheet entries. By other words if one surnames educating in one group can without problem registrate. But one student not be registries twice. Parole in coincide with othe entries don’t be checked. And in not to be identification of users.

Way of authorities this, fill in name, surname and twice parole and checker have they or no users with that surname in their group work with base of facts. And they have parole access to base of facts, which c checked by programme if margin name, surname group not complete or parol don’t coincide, message come about mistake.

Using unstandart formats of files, which can’t be read with usually means.

For example, process of realizing components WebBrowser, can be that they saved in formate *.dat which comfortable using for work with tests but don’t support WebBrowser.

 Example of using files type *.ini.

Files of type *.ini may be used for saving logins and parols. In what example file not protect and for registration and come on programme of users using next process:

        name:=edit2.Text;

        pass:=maskedit1.Text;

           writeini(name,'password',pass,'\users.ini');

           writeini(name,'test1','1','\users.ini');

           combobox1.Items.Append(name);

           combobox1.Items.SaveToFile('users');

           for i:=2 to 12 do

       writeini(edit2.Text,'test'+inttostr(i),'0','\users.ini');

         Ciphering text exercises

         For example to join tests to book may be used different ciphering. Test exercises is in files with widening *.ini. For example, with next process we add and ciphering tests exercises:

        readln(f,s);

        n:=length(s);

        if (s<>'')then         begin

            b:=s[1]+s[2];

            if b='A)' then             begin

                if s[n]='*' then begin s[n]:=' ';edit2.Text:=s;s[n]:='*';end;

                if s[n]<>'*' then edit2.Text:=s;

            end;

….

            if ((b<>'A)')and(b<>'B)')and(b<>'C)')and(b<>'D)')and(b<>'E)')and

            (s<>'********')) then             begin

                q:=s;

                edit1.text:=q;

                inc(i);

                edit8.Text:=inttostr(i);

            end;

            if((s[n]='*')and(s<>'********'))

 

References:

1. Sajt http://www.securityfocus.com/.

2. Ivanov M.A. Kriptograficheskie metody zashhity informacii v komp'juternyh sistemah i setjah», - M.: 2001g.

3. Gerasimenko V.A.,Razmahnin M.K."Kriptograficheskie metody v avtomatizirovannyh sistemah" Zarubezhnaja radiojelektronika,1982,N8.

4. Arhangel'skij V.B. Delph6: spravochnoe posobie. - Sankt-Peterburg.: Piter, 2002. S. 452-521.

5. Jebner M. Delphi 6. Rukovodstvo razrabotchika. – M.: BHV, 2002. S. 316-345.