Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


Lecture notes, cheat sheets
Free library / Directory / Lecture notes, cheat sheets

Computer science. Fundamentals of information security (lecture notes)

Lecture notes, cheat sheets

Directory / Lecture notes, cheat sheets

Comments on the article Comments on the article

Table of contents (expand)

Topic 10. Fundamentals of information security

10.1. Information protection as a regularity in the development of computer systems

Information protection is the use of various means and methods, the use of measures and the implementation of measures in order to ensure the system of reliability of transmitted, stored and processed information.

Information security includes:

▪ ensuring the physical integrity of information, eliminating distortion or destruction of information elements;

▪ preventing the substitution of information elements while maintaining its integrity;

▪ denying unauthorized access to information to persons or processes that do not have the appropriate authority to do so;

▪ gaining confidence that the information resources transferred by the owner will be used only in accordance with the terms agreed upon by the parties.

The processes of violating the reliability of information are divided into accidental and malicious (intentional). The sources of random destructive processes are unintentional, erroneous actions of people, technical failures. Malicious violations appear as a result of deliberate actions of people.

The problem of information security in electronic data processing systems arose almost simultaneously with their creation. It was caused by specific facts of malicious actions with information.

The importance of the problem of providing information reliability is confirmed by the cost of protective measures. Significant material and financial costs are required to provide a reliable protection system. Before building a protection system, an optimization model should be developed that allows achieving the maximum result with a given or minimum expenditure of resources. The calculation of the costs that are necessary to provide the required level of information security should begin with the clarification of several facts: a complete list of threats to information, the potential danger to information of each of the threats, the amount of costs required to neutralize each of the threats.

If in the first decades of active use of a PC, the main danger was posed by hackers who connected to computers mainly through the telephone network, then in the last decade, the violation of information reliability has been progressing through programs, computer viruses, and the global Internet.

There are many ways of unauthorized access to information, including:

▪ viewing;

▪ copying and substitution of data;

▪ input of false programs and messages as a result of connecting to communication channels;

▪ reading the remaining information on its media;

▪ reception of electromagnetic radiation and wave signals;

▪ use of special programs.

To combat all these methods of unauthorized access, it is necessary to develop, create and implement a multi-stage continuous and managed information security architecture. It is not only confidential information that should be protected. The object of protection is usually affected by a certain combination of destabilizing factors. At the same time, the type and level of influence of some factors may not depend on the type and level of others.

A situation is possible when the type and level of interaction of existing factors significantly depend on the influence of others, which explicitly or implicitly enhance such impacts. In this case, it is necessary to apply both means that are independent from the point of view of the effectiveness of protection, and interdependent. In order to provide a sufficiently high level of data security, a compromise must be found between the cost of protective measures, the inconvenience of using protective measures, and the importance of the information being protected. Based on a detailed analysis of numerous interacting factors, a reasonable and effective decision can be made about the balance of protection measures against specific sources of danger.

10.2. Objects and elements of protection in computer data processing systems

A protected object is a system component that contains protected information. A security element is a set of data that may contain information necessary for protection.

During the operation of computer systems, the following may occur:

▪ equipment failures and malfunctions;

▪ system and system technical errors;

▪ software errors;

▪ human errors when working with a computer.

Unauthorized access to information is possible during maintenance of computers in the process of reading information on machine and other media. Illegal familiarization with information is divided into passive and active. With passive acquaintance with information, there is no violation of information resources and the offender can only disclose the content of messages. In the case of active unauthorized access to information, it is possible to selectively change, destroy the order of messages, redirect messages, delay and create fake messages.

To ensure security, various activities are carried out, which are united by the concept of "information security system".

An information security system is a set of organizational (administrative) and technological measures, software and hardware, legal, moral and ethical standards that are used to prevent the threat of violators in order to minimize possible damage to users and owners of the system.

Organizational and administrative means of protection is the regulation of access to information and computing resources, as well as the functional processes of data processing systems. These protections are used to hinder or eliminate the possibility of implementing security threats. The most typical organizational and administrative means are:

▪ admission to the processing and transmission of protected information only to verified officials;

▪ storage of information media that represent a certain secret, as well as registration logs in safes inaccessible to unauthorized persons;

▪ accounting for the use and destruction of documents (media) with protected information;

▪ dividing access to information and computing resources for officials in accordance with their functional responsibilities.

Technical means of protection are used to create some physically closed environment around the object and protection elements. It uses activities such as:

▪ limitation of electromagnetic radiation through shielding of rooms in which information processing is carried out;

▪ implementation of power supply to equipment that processes valuable information from an autonomous power source or a general electrical network through special network filters.

Software tools and methods of protection are more active than others used to protect information in PCs and computer networks. They implement such protection functions as differentiation and control of access to resources; registration and study of ongoing processes; prevention of possible destructive impacts on resources; cryptographic protection of information.

Technological means of information protection are understood as a number of activities that are organically built into the technological processes of data conversion. They also include:

▪ creating archival copies of media;

▪ manual or automatic saving of processed files in external computer memory;

▪ automatic registration of user access to various resources;

▪ development of special instructions for performing all technological procedures, etc.

Legal and moral and ethical measures and means of protection include the laws in force in the country, regulations governing the rules, norms of behavior, the observance of which contributes to the protection of information.

10.3. Means of identification and differentiation of access to information

Identification is the assignment of a unique name or image to an object or subject. Authentication is the establishment of the identity of an object or subject, i.e. checking whether the object (subject) is who he claims to be.

The ultimate goal of the procedures for identifying and authenticating an object (subject) is to admit it to information of limited use in the event of a positive check or deny admission in case of a negative result of the check.

The objects of identification and authentication include: people (users, operators); technical means (monitors, workstations, subscriber points); documents (manual, printouts); magnetic storage media; information on the monitor screen.

The most common authentication methods include assigning a password to a person or other name and storing its value in a computer system. A password is a set of characters that defines an object (subject).

The password as a security tool can be used to identify and authenticate the terminal from which the user logs in, as well as to authenticate the computer back to the user.

Given the importance of a password as a means of increasing the security of information from unauthorized use, the following precautions must be observed:

1) do not store passwords in a computer system in an unencrypted place;

2) do not print or display passwords in clear text on the user's terminal;

3) do not use your name or the names of relatives, as well as personal information (date of birth, home or office phone number, street name) as a password;

4) do not use real words from an encyclopedia or an explanatory dictionary;

5) use long passwords;

6) use a mixture of upper and lower case keyboard characters;

7) use combinations of two simple words connected by special characters (for example, +,=,<);

8) use non-existent new words (absurd or even delusional content);

9) change the password as often as possible.

To identify users, systems that are complex in terms of technical implementation can be used, which provide user authentication based on the analysis of his individual parameters: fingerprints, hand line pattern, iris, voice timbre. The most widely used are physical identification methods that use carriers of password codes. Such carriers can be a pass in access control systems; plastic cards with the name of the owner, his code, signature; plastic cards with a magnetic strip, which is read by a special reader; plastic cards containing an embedded microchip; optical memory cards.

One of the most intensively developed areas for ensuring information security is the identification and authentication of documents based on electronic digital signature. When transmitting information via communication channels, facsimile equipment is used, but in this case, the recipient does not receive the original, but only a copy of the document with a copy of the signature, which during transmission can be re-copied to use a false document.

An electronic digital signature is a method of encryption using cryptographic transformation and is a password that depends on the sender, recipient and content of the transmitted message. To prevent reuse of the signature, it must be changed from message to message.

10.4. Cryptographic method of information protection

The most effective means of improving security is cryptographic transformation. To improve security, do one of the following:

1) data transmission in computer networks;

2) transfer of data that is stored in remote memory devices;

3) the transfer of information in the exchange between remote objects.

The protection of information by the method of cryptographic transformation consists in bringing it to an implicit form through the transformation of the constituent parts of information (letters, numbers, syllables, words) using special algorithms or hardware and key codes. The key is a mutable part of the cryptographic system, kept secret and determining which of the possible encryption transformations is performed in this case.

To change (encryption) some algorithm or a device that implements a given algorithm is used. Algorithms can be known to a wide range of people. The encryption process is controlled by a periodically changing key code, which provides each time the original presentation of information in the case of using the same algorithm or device. With a known key, it is possible to decrypt the text relatively quickly, simply and reliably. Without knowing the key, this procedure can become almost impossible even when using a computer.

The following necessary requirements are imposed on the methods of cryptographic transformation:

1) it must be sufficiently resistant to attempts to reveal the original text using the encrypted one;

2) key exchange should not be hard to remember;

3) the costs of protective transformations should be made acceptable for a given level of information security;

4) errors in encryption should not cause a clear loss of information;

5) the size of the ciphertext must not exceed the size of the original text.

Methods intended for protective transformations are divided into four main groups: permutations, substitutions (substitutions), additive and combined methods.

The methods of permutation and replacement (substitution) are characterized by short keys, and the reliability of protection is determined by the complexity of the transformation algorithms. In contrast, additive methods are characterized by simple algorithms and long keys. Combined methods are more reliable. They most often combine the advantages of the components used.

The four cryptographic transformation methods mentioned are symmetric encryption methods. The same key is used for both encryption and decryption.

The main methods of cryptographic transformation are the permutation and replacement methods. The basis of the permutation method is to break the source text into blocks, and then write these blocks and read the ciphertext along different paths of a geometric figure.

Replacement encryption means that the characters of the source text (block) written in one alphabet are replaced by characters of another alphabet in accordance with the transformation key used.

The combination of these methods has led to the formation of the derivative cipher method, which has strong cryptographic capabilities. The algorithm of the method is implemented both in hardware and software, but is designed to be implemented using special-purpose electronic devices, which allows achieving high performance and simplified organization of information processing. The industrial production of equipment for cryptographic encryption, established in some Western countries, makes it possible to dramatically increase the level of security of commercial information during its storage and electronic exchange in computer systems.

10.5. Computer viruses

A computer virus is a specially written program that can spontaneously attach to other programs (infect them), create copies of itself and inject them into files, system areas of a computer and other computers connected with it in order to disrupt the normal operation of programs, damage files and directories, and as well as creating various interference when working on a computer.

The appearance of viruses in a computer is determined by the following observable signs:

▪ decrease in computer performance;

▪ impossibility and slowdown of loading the OS;

▪ increasing the number of files on disk;

▪ replacing file sizes;

▪ periodic appearance of inappropriate messages on the monitor screen;

▪ reducing the volume of free OP;

▪ a sharp increase in hard disk access time;

▪ destruction of the file structure;

▪ the disk drive warning light comes on when it is not being accessed.

Removable disks (floppy disks and CD-ROMs) and computer networks are usually the main ways to infect computers with viruses. Infection of the computer's hard disk can occur if the computer is booted from a floppy disk containing a virus.

Based on the type of habitat viruses have, they are classified into boot, file, system, network and file-boot (multifunctional).

Boot viruses infect the boot sector of a disk or the sector that contains the boot program of the system disk.

File viruses are located mainly in .COM and .EXE executable files.

System viruses infect system modules and peripheral device drivers, file allocation tables, and partition tables.

Network viruses reside in computer networks, while file-boot viruses infect disk boot sectors and application program files.

Viruses are divided into resident and non-resident viruses along the way of infecting the habitat.

Resident viruses, when infecting a computer, leave their resident part in the operating system, which, after infection, intercepts the OS's calls to other objects of infection, infiltrates them and performs its destructive actions, which can lead to shutdown or reboot of the computer. Non-resident viruses do not infect the computer operating system and are active for a limited time.

The peculiarity of the construction of viruses affects their manifestation and functioning.

A logic bomb is a program that is built into a large software package. It is harmless until a certain event occurs, after which its logical mechanism is implemented.

Mutant programs, self-reproducing, create copies that are clearly different from the original.

Invisible viruses, or stealth viruses, intercept OS calls to affected files and disk sectors and substitute uninfected objects instead. When accessing files, these viruses use rather original algorithms that allow them to "deceive" resident anti-virus monitors.

Macro viruses use the capabilities of macro languages ​​that are built into office data processing programs (text editors, spreadsheets).

By the degree of impact on the resources of computer systems and networks, or by destructive capabilities, harmless, non-dangerous, dangerous and destructive viruses are distinguished.

Harmless viruses do not have a pathological effect on the computer. Mild viruses do not destroy files, but reduce free disk space and display graphical effects. Dangerous viruses often cause significant disruption to your computer. Destructive viruses can lead to the erasure of information, complete or partial disruption of the operation of application programs. It is important to keep in mind that any file capable of loading and executing program code is a potential place for a virus to be placed.

10.6. Antivirus programs

The widespread use of computer viruses has led to the development of anti-virus programs that allow you to detect and destroy viruses and "treat" affected resources.

The basis of most anti-virus programs is the principle of searching for virus signatures. A virus signature is some unique characteristic of a virus program that indicates the presence of a virus in a computer system. Most often, anti-virus programs include a periodically updated database of virus signatures. An antivirus program examines and analyzes a computer system and makes comparisons to match signatures in a database. If the program finds a match, it tries to clean up the detected virus.

According to the way they work, anti-virus programs can be divided into filters, auditors, doctors, detectors, vaccines, etc.

Filter programs are "watchmen" that are constantly in the OP. They are resident and intercept all requests to the OS to perform suspicious actions, i.e. operations that use viruses to reproduce and damage information and software resources in the computer, including reformatting the hard drive. Among them are attempts to change file attributes, correct executable COM or EXE files, write to disk boot sectors.

Each time such an action is requested, a message appears on the computer screen stating what action is requested and which program will perform it. In this case, the user must either allow or deny its execution. The constant presence of "watchdog" programs in the OP significantly reduces its volume, which is the main disadvantage of these programs. In addition, filter programs are not able to "treat" files or disks. This function is performed by other antivirus programs, such as AVP, Norton Antivirus for Windows, Thunder Byte Professional, McAfee Virus Scan.

Auditor programs are a reliable means of protecting against viruses. They remember the initial state of programs, directories and system areas of the disk, provided that the computer has not yet been infected with a virus. Subsequently, the program periodically compares the current state with the original. If inconsistencies are found (by file length, modification date, file cycle control code), a message about this appears on the computer screen. Among the auditor programs, one can single out the Adinf program and its addition in the form of the Adinf cure Module.

The doctor program is capable of not only detecting, but also “cleaning” infected programs or disks. At the same time, it destroys the infected programs of the virus body. Programs of this type can be divided into phages and polyphages. Phages are programs that are used to search for viruses of a certain type. Polyphages are designed to detect and destroy a wide variety of viruses. In Russia, the most commonly used polyphages are MS Antivirus, Aidstest, Doctor Web. They are continuously updated to combat emerging new viruses.

Detector programs are able to detect files infected with one or more viruses known to the program developers.

Vaccine programs, or immunizers, belong to the class of resident programs. They modify programs and disks in a way that does not affect their operation. However, the virus that is being vaccinated against considers them already infected and does not infect them. At the moment, many anti-virus programs have been developed that have received wide recognition and are constantly updated with new tools to combat viruses.

The Doctor Web polyphage program is used to combat polymorphic viruses that have appeared relatively recently. In heuristic analysis mode, this program effectively detects files infected with new, unknown viruses. Using Doctor Web to control floppy disks and files received over the network, you can almost certainly avoid system infection.

When using the Windows NT operating system, there are problems with protection against viruses designed specifically for this environment. A new type of infection has also appeared - macro viruses that are "implanted" in documents prepared by the Word word processor and Excel spreadsheets. The most common antivirus programs include AntiViral Toolkit Pro (AVP32), Norton Antivirus for Windows, Thunder Byte Professional, McAfee Virus Scan. These programs function in the mode of scanner programs and carry out anti-virus control of OP, folders and disks. In addition, they contain algorithms for recognizing new types of viruses and allow you to disinfect files and disks during the scan.

AntiViral Toolkit Pro (AVP32) is a 32-bit application that runs on Windows NT. It has a convenient user interface, a help system, a flexible system of user-selectable settings, and recognizes more than 7 different viruses. This program detects (detects) and removes polymorphic viruses, mutant and stealth viruses, as well as macro viruses that infect a Word document and Excel spreadsheets, Access objects - "Trojan horses".

An important feature of this program is the ability to control all file operations in the background and detect viruses before the system is actually infected, as well as detect viruses inside ZIP, ARJ, ZHA, RAR archives.

The interface of AllMicro Antivirus is simple. It does not require any additional knowledge about the product from the user. When working with this program, you should press the Start (Scan) button, after which it will start checking or scanning the OP, boot and system sectors of the hard disk, and then all files, including archived and packed ones.

Vscan 95 scans the computer's memory, boot sectors of the system drive, and all files in the root directory at boot. The other two programs in the package (McAfee Vshield, Vscan) are Windows applications. The first after loading Windows is used to monitor newly connected drives, control executable programs and copied files, and the second - to additionally check memory, drives and files. McAfee VirusScan can find macro viruses in MS Word files.

In the process of development of local computer networks, e-mail and the Internet and the introduction of the Windows NT network operating system, anti-virus software developers have prepared and put on the market such programs as Mail Checker, which allows you to check incoming and outgoing e-mail, and AntiViral Toolkit Pro for Novell NetWare (AVPN ) used to detect, disinfect, delete and move infected files to a special directory. The AVPN program is used as an anti-virus scanner and filter that constantly monitors the files stored on the server. He is able to remove, move and "heal" affected objects; check packed and archived files; identify unknown viruses using a heuristic mechanism; scan remote servers in scanner mode; disconnect the infected station from the network. The AVPN program is easily configured to scan files of various types and has a convenient scheme for replenishing the anti-virus database.

10.7. Software protection

Software products are important objects of protection for a number of reasons:

1) they are the product of the intellectual labor of highly qualified specialists, or even groups of several tens or even hundreds of people;

2) the design of these products is associated with the consumption of significant material and labor resources and is based on the use of expensive computer equipment and high technologies;

3) to restore broken software, significant labor costs are required, and the use of simple computing equipment is fraught with negative results for organizations or individuals.

Protection of software products has the following goals:

▪ restriction of unauthorized access of certain categories of users to work with them;

▪ exclusion of deliberate damage to programs in order to disrupt the normal course of data processing;

▪ preventing intentional modification of the program for the purpose of damaging the reputation of the software manufacturer;

▪ preventing unauthorized replication (copying) of programs;

▪ exclusion of unauthorized study of the content, structure and mechanism of the program.

Software products should be protected from unauthorized influences of various objects: a person, technical means, specialized programs, the environment. Influence on the software product is possible through the use of theft or physical destruction of the documentation for the program or the machine carrier itself, as well as by disrupting the functionality of the software.

Technical means (hardware) through connection to a computer or transmission medium can read, decrypt programs, as well as their physical destruction.

Virus infection can be performed using specialized programs, virus infection of a software product, its unauthorized copying, unauthorized study of its content.

The environment due to anomalous phenomena (increased electromagnetic radiation, fire, floods) can cause physical destruction of the software product.

The easiest and most affordable way to protect software products is to restrict access to them using:

▪ password protection of programs when they are launched;

▪ key floppy disk;

▪ a special technical device (electronic key) connected to the computer input/output port.

In order to avoid unauthorized copying of programs, special protection software should:

▪ identify the environment from which the program is launched;

▪ keep records of the number of authorized installations or copies performed;

▪ counteract (even to the point of self-destruction) the study of algorithms and programs of the system.

For software products, effective safeguards are:

1) identification of the environment from which the program is launched;

2) entering a record of the number of authorized installations or copies made;

3) counteraction to non-standard formatting of the startup floppy disk;

4) fixing the location of the program on the hard disk;

5) binding to an electronic key inserted into the input-output port;

6) binding to the BIOS number.

When protecting software products, it is necessary to use legal methods. Among them are licensing agreements and contracts, patent protection, copyright, technological and industrial secrecy.

10.8. Securing data on an offline computer

The most common cases that pose a threat to data are accidental data erasure, software failure and hardware failure. One of the first recommendations to the user is to back up the data.

For magnetic disks, there is such a parameter as the mean time between failures. It can be expressed in years, so a backup is needed.

When working on a computer, data is sometimes not read due to the failure of the hard disk control board. By replacing the controller board and restarting the computer, you can resume the interrupted job.

In order to ensure the safety of data, it is necessary to create backup copies. The use of copying as one of the data security methods requires the choice of software product, procedure (full, partial or selective backup) and frequency of backup. Depending on the significance of the information, a double backup is sometimes made. Do not neglect the testing of backups. Data must also be protected when the computer is on a small network, when users use file server shares.

Security methods include:

▪ use of attributes of files and directories such as “hidden”, “read-only”;

▪ storing important data on floppy disks;

▪ placement of data in password-protected archive files;

▪ inclusion of regular scanning for computer viruses in the security program.

There are three main ways to use antivirus programs:

1) search for a virus at boot, when the command to launch an anti-virus program is included in AUTOEXEC.bat;

2) launching a virus program manually;

3) visual preview of each uploaded file.

A pragmatic method for securing information on an offline computer is password protection. After turning on the computer and running the CM08 installer, the user can enter the information twice, which becomes the password. Further protection at the CMOS level locks the entire computer if the correct password is not entered.

In case you don't want to use a password at boot, some keyboard models can be locked using the physical keys that came with your computer.

The ability to protect some files is provided when the user works with office packages (word processors, spreadsheets, DBMS) and executes the command to save files (Save as...). If in this case you click on the button Options (Options), then in the dialog box that opens, you can set a password that limits the ability to work with this document. In order to restore the original form of data protected in this way, the same password must be entered. The user can forget or, having written it down on paper, simply lose the password, then even more trouble can arise than when working without password protection.

There are quite a variety of ways to protect computers that work stand-alone or as part of a small network, at home or in the office. When choosing a strategy for protecting information on a computer, it is necessary to find a compromise between the value of the protected data, the costs of providing protection, and the inconvenience that the protection system imposes on working with data.

10.9. Data Security in an Online Environment

Interactive environments are vulnerable in terms of data security. An example of interactive media is any of the systems with communication capabilities, such as email, computer networks, the Internet.

E-mail is any form of communication used by computers and modems. The most vulnerable places in email are the sender's outbox and the recipient's mailbox. Each of the email software packages allows you to archive incoming and outgoing messages to any other address, which can lead to abuse by intruders.

E-mail, while providing message forwarding, can cause significant harm to the recipient of messages. Other safety measures should be used to prevent undesirable consequences, including:

▪ You cannot immediately launch programs received by email, especially attachments. You need to save the file on disk, scan it with an antivirus program and only then run it;

▪ It is prohibited to disclose your password and personal data, even if the sender offers the recipient something very tempting;

▪ when opening received MS Office files (in Word, Excel), you should, if possible, not use macros;

▪ It is important to try to use proven as well as newer versions of email programs.

One of the important problems for Internet users is the problem of data security in the network itself. The user is connected to the resources through the provider. In order to protect information from hooligan elements, unskilled users and criminals, the Internet system uses a system of rights, or access control. Each data file (or other computer resources) has a set of attributes that say that this file can be viewed by anyone, but only the owner has the right to change it. Another problem is that no one but the owner can view the file, despite the fact that the names of these information resources are visible. Usually the user seeks to protect their information in some way, but it must be remembered that system administrators can overcome protection systems. In this case, various methods of encrypting information using keys developed by the user come to the rescue.

One of the problems of working on the Internet is restricting the access of certain categories of users to information resources (children and schoolchildren). This can be done with the help of special software products - firewalls (Net Nanny, Surf-Watch, Cyber ​​Patrol). They are based on the principle of keyword filtering, fixed lists of WWW service locations that contain inappropriate material for children. Similar programs that record Internet sessions and deny access to certain places on the network can be installed in offices and other establishments to prevent the phenomenon of employees wasting time for personal interests.

Internet - a system in which numerous users have their own Web servers containing advertising or reference information on Web pages. Competitors are able to spoil out the content. To avoid trouble in such situations, you can surf the Web regularly. If information is corrupted, it must be restored using pre-prepared copies of files. It is important to keep in mind that providers who systematically review event logs and update software if security problems are found in it are obliged to ensure the security of information on servers.

Author: Kozlova I.S.

<< Back: Fundamentals of algorithmization and programming (Concept of an algorithm. Programming systems. Classification of high-level programming languages. VBA system. VBA programming language)

>> Forward: Database (The concept of a database. Database management systems. Hierarchical, network and relational data representation models. Post-relational, multidimensional and object-oriented data representation models. Classifications of database management systems. Database access languages. Internet databases)

We recommend interesting articles Section Lecture notes, cheat sheets:

National economy. Lecture notes

EU law. Crib

infectious diseases. Lecture notes

See other articles Section Lecture notes, cheat sheets.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

The existence of an entropy rule for quantum entanglement has been proven 09.05.2024

Quantum mechanics continues to amaze us with its mysterious phenomena and unexpected discoveries. Recently, Bartosz Regula from the RIKEN Center for Quantum Computing and Ludovico Lamy from the University of Amsterdam presented a new discovery that concerns quantum entanglement and its relation to entropy. Quantum entanglement plays an important role in modern quantum information science and technology. However, the complexity of its structure makes understanding and managing it challenging. Regulus and Lamy's discovery shows that quantum entanglement follows an entropy rule similar to that for classical systems. This discovery opens new perspectives in the field of quantum information science and technology, deepening our understanding of quantum entanglement and its connection to thermodynamics. The results of the study indicate the possibility of reversibility of entanglement transformations, which could greatly simplify their use in various quantum technologies. Opening a new rule ... >>

Mini air conditioner Sony Reon Pocket 5 09.05.2024

Summer is a time for relaxation and travel, but often the heat can turn this time into an unbearable torment. Meet a new product from Sony - the Reon Pocket 5 mini-air conditioner, which promises to make summer more comfortable for its users. Sony has introduced a unique device - the Reon Pocket 5 mini-conditioner, which provides body cooling on hot days. With it, users can enjoy coolness anytime, anywhere by simply wearing it around their neck. This mini air conditioner is equipped with automatic adjustment of operating modes, as well as temperature and humidity sensors. Thanks to innovative technologies, Reon Pocket 5 adjusts its operation depending on the user's activity and environmental conditions. Users can easily adjust the temperature using a dedicated mobile app connected via Bluetooth. Additionally, specially designed T-shirts and shorts are available for convenience, to which a mini air conditioner can be attached. The device can oh ... >>

Energy from space for Starship 08.05.2024

Producing solar energy in space is becoming more feasible with the advent of new technologies and the development of space programs. The head of the startup Virtus Solis shared his vision of using SpaceX's Starship to create orbital power plants capable of powering the Earth. Startup Virtus Solis has unveiled an ambitious project to create orbital power plants using SpaceX's Starship. This idea could significantly change the field of solar energy production, making it more accessible and cheaper. The core of the startup's plan is to reduce the cost of launching satellites into space using Starship. This technological breakthrough is expected to make solar energy production in space more competitive with traditional energy sources. Virtual Solis plans to build large photovoltaic panels in orbit, using Starship to deliver the necessary equipment. However, one of the key challenges ... >>

Random news from the Archive

Cocoa improves visual acuity 03.07.2021

Researchers in Spain have studied the effect of compounds found in cocoa and red berries on retinal function in healthy eyes.

Cocoa and red berries are good sources of polyphenols in the human diet. Red berries are characterized by the presence of anthocyanins, a group of red-purple-blue flavonoids associated with endothelial protection and inflammation. Cocoa is rich in flavan-3-ols but also contains other polyphenols such as phenolic acids and flavonols.

In addition, cocoa is a good source of theobromine, which, unlike caffeine, has less of a psychoactive effect but can lower blood pressure, while caffeine increases it depending on the individual.

Other interesting news:

▪ The fastest jaws in the world

▪ New Mobile Intel Processors

▪ ZL60301 - transmitter for fiber optic systems

▪ Use of film costumes for disease research

▪ Earth's twin planet discovered

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ section of the site Instructions for use. Article selection

▪ article Reel yourself on the mustache. Popular expression

▪ article Which of the Kievan princes was the first to adopt Christianity? Detailed answer

▪ article Personnel of radiodiagnostic subdivisions of medical institutions. Standard instruction on labor protection

▪ article Scheme of the electrical equipment of the car Moskvich M-412. Encyclopedia of radio electronics and electrical engineering

▪ article Valcoder from the mouse. Encyclopedia of radio electronics and electrical engineering

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024