Modern
information technology/4. Informational safety.
Begalin
A.Sh., senior teacher,
Kostanay
state university named after A. Baitursynov
Stavrianidi
P.M., senior teacher,
Kostanay
engineering economic university Myrzhakyp Dulatov
Suhov
M.V., c.t.s., senior teacher,
Kostanay
state pedagogical institute
REALIZING
SYSTEM OF PROTECT INFORMATION IN
ELECTRONIC
EDUCATIONAL PROGRAM
Protecting
electronic facts educational publication and educational programs may be
realized different ways. Many people
used just management of program by delimitation rights users.
Others used for
keeping base facts, not that usual text tiles. Very other by using many users
electronic educational regime administrational for keeping logins and password
used usually texts files without paroles *.txt, *.ini, *.dat or files
base facts *.db, *.dbf, *mdb. And few people think about that they must protect
them from unsanctioned access. Of course other if electronic book working in
net, charge with server here problem of protect will be less actual from local
version.
How better
protect facts electronic book by local used from possibility rewrite, peep,
find and look right answers, come in by somebodies logins? In may opinion here
some ways how it do:
-
Realize many users regime with
delimitation rights of users;
-
Using regime of administrational;
-
Facts of education, register users
may he save in cipher files or base facts by closed paroles;
-
Materials of electronic books
(lections, text and practical exercises, question) many be closed from un
mediocrity access by way of ciphering or with parols;
-
Using complication parls.
For additional protect may used:
-
Ciphering base of facts;
-
Using files of unstandart format;
-
Ciphering all texts exercises and
answers, and other materials (lection, practical exercises).
Examples of using
different ways of protect.
Registration of
parols and manyusers regime.
Examples.
Registration users fill in three margins. Name, surname, group and twice for
shun mistakes come in parole. Facts users and his parole saved in base of fact
which protectbyparol. Paroles have only teacher and he realize administration
base. In registration don’t admit saved wih unfilled margins. Name, surname,
group and if filled on there margins exists in one tally sheet entries. By
other words if one surnames educating in one group can without problem
registrate. But one student not be registries twice. Parole in coincide with
othe entries don’t be checked. And in not to be identification of users.
Way of
authorities this, fill in name, surname and twice parole and checker have they
or no users with that surname in their group work with base of facts. And they
have parole access to base of facts, which c checked by programme if margin
name, surname group not complete or parol don’t coincide, message come about
mistake.
Using unstandart
formats of files, which can’t be read with usually means.
For example,
process of realizing components WebBrowser, can be that they saved in formate
*.dat which comfortable using for work with tests but don’t support WebBrowser.
Example of using files type *.ini.
Files of type
*.ini may be used for saving logins and parols. In what example file not
protect and for registration and come on programme of users using next process:
name:=edit2.Text;
pass:=maskedit1.Text;
writeini(name,'password',pass,'\users.ini');
writeini(name,'test1','1','\users.ini');
combobox1.Items.Append(name);
combobox1.Items.SaveToFile('users');
for
i:=2 to 12 do
writeini(edit2.Text,'test'+inttostr(i),'0','\users.ini');
Ciphering
text exercises
For
example to join tests to book may be used different ciphering. Test exercises
is in files with widening *.ini. For example, with next process we add and
ciphering tests exercises:
readln(f,s);
n:=length(s);
if (s<>'')then begin
b:=s[1]+s[2];
if b='A)' then begin
if s[n]='*' then begin s[n]:='
';edit2.Text:=s;s[n]:='*';end;
if s[n]<>'*' then edit2.Text:=s;
end;
….
if
((b<>'A)')and(b<>'B)')and(b<>'C)')and(b<>'D)')and(b<>'E)')and
(s<>'********')) then begin
q:=s;
edit1.text:=q;
inc(i);
edit8.Text:=inttostr(i);
end;
if((s[n]='*')and(s<>'********'))
References:
1. Sajt
http://www.securityfocus.com/.
2. Ivanov M.A.
Kriptograficheskie metody zashhity informacii v komp'juternyh sistemah i
setjah», - M.: 2001g.
3. Gerasimenko
V.A.,Razmahnin M.K."Kriptograficheskie metody v avtomatizirovannyh
sistemah" Zarubezhnaja radiojelektronika,1982,N8.
4. Arhangel'skij
V.B. Delph6: spravochnoe posobie. - Sankt-Peterburg.: Piter, 2002. S. 452-521.
5. Jebner M.
Delphi 6. Rukovodstvo razrabotchika. – M.: BHV, 2002. S. 316-345.