Servicio Fitosanitario Del Estado Risk Advisory

Total Page:16

File Type:pdf, Size:1020Kb

Servicio Fitosanitario Del Estado Risk Advisory Servicio Fitosanitario del Estado Risk Advisory Informe de Control Interno “Resultados del estudio de auditoría relativo a la evaluación del sistema de control interno en materia de tecnologías de la información, implementado para cumplir con lo dispuesto en el Decreto Ejecutivo N.° 37549-JP (Reglamento para la Protección de los Programas de Cómputo en los Ministerios e Instituciones adscritas al Gobierno Central)” Ref.: N° AI-SFE-SA-INF-005-2016 00 Servicio Fitosanitario del Estado | Tabla de contenido Tabla de contenido Tabla de contenido 1 Resumen ejecutivo 3 Introducción 4 Resultados del estado de los inventarios y del licenciamiento 14 Seguimiento al informe AI-SFE-SA-INF-005- 2015 34 Resultados - Hallazgos 36 Anexos 61 01 Servicio Fitosanitario del Estado | TablaInforme de decontenido Control Interno “Resultados del estudio de auditoría relativo a la evaluación del sistema de control interno en materia de tecnologías de la información, implementado para cumplir con lo dispuesto en el Decreto Ejecutivo N. 37549-JP (Reglamento Informe de Control Interno “Resultados del estudio de auditoría relativo a la evaluación del sistema de control interno en materia de tecnologías de la información, implementado para cumplir con lo dispuesto en el Decreto Ejecutivo N.° 37549-JP (Reglamento para la Protección de los Programas de Cómputo en los Ministerios e Instituciones adscritas al Gobierno Central)” 02 Servicio Fitosanitario del Estado | Resumen ejecutivo Resumen ejecutivo Objetivo El presente estudio de auditoría relacionado con la “Evaluación del sistema de control interno en materia de tecnologías de la información, implementado para cumplir con lo dispuesto en el Decreto Ejecutivo N.° 37549-JP (Reglamento para la Protección de los Programas de Cómputo en los Ministerios e Instituciones Adscritas al Gobierno Central)”, se llevó a cabo en atención al Plan Anual de Labores (2016) de la Auditoría Interna del Servicio Fitosanitario del Estado (SFE). El estudio abarcó la totalidad del equipo con el que cuenta el SFE, tanto adquirido como arrendado, y se analizó el licenciamiento asociado en todas sus modalidades FPP (por las siglas en inglés de Full Package Product o producto adquirido por medio de caja o producto al detalle), OEM (por las siglas en inglés de Enterprise Equipment Manufacturer), software licenciado, software libre y software gratuito. De manera complementaria, se tomó en cuenta el equipo ubicado en bodega, en mantenimiento y con estado de robado, además del equipo de un programa ejecutado aparentemente en conjunto con una ONG que no pertenece al SFE. Los resultados obtenidos evidencian aspectos que requieren ser atendidos de forma oportuna por la administración activa; se encontraron en total 8 hallazgos, los cuales se clasifican en los siguientes niveles de riesgo: • Alto (A) • Bajo (B) Dicha categorización corresponde al impacto que se puede ocasionar en el cumplimiento de los objetivos de la entidad, en los procesos establecidos por parte del control interno, en la gestión y operaciones, y en el cumplimiento de lo dispuesto en el Decreto Ejecutivo N.º 37549-JP. 03 Servicio Fitosanitario del Estado | Introducción Introducción 1.1. Origen En el artículo 3° del Decreto Ejecutivo N.° 37549-JP (Reglamento para la Protección de los Programas de Cómputo en los Ministerios e Instituciones Adscritas al Gobierno Central), se dispone lo siguiente: Artículo 3.º Cada Ministerio e Institución adscrita al Gobierno Central, deberá realizar anualmente una auditoría interna o externa según las propias posibilidades presupuestarias y organizacionales para determinar el cumplimiento de las disposiciones tendientes a la protección de los derechos de autor, relativos a los programas de cómputo; mediante la auditoría se deberá verificar los equipos existentes y los programas que tengan las computadoras, así como el número de copias autorizadas de cada programa, comprobando la fecha de instalación, versión de cada uno y ajustado a los términos de licenciamiento. 04 Servicio Fitosanitario del Estado | Introducción Artículo 4.º Posterior a la auditoría mencionada en el artículo anterior, cada Ministerio e Institución adscrita al Gobierno Central, a través de la persona designada como responsable deberá presentar un informe anual(*) dentro del primer semestre de cada año ante el Registro de Derechos de Autor y Derechos Conexos. Este informe pondrá en conocimiento del citado Registro los resultados del auditoraje efectuado por el respectivo Ministerio o Institución adscrita al Gobierno Central, así como las acciones aplicadas; en el mismo deberán indicar el grado de cumplimiento y cantidad de equipos existentes, se deberá adjuntar el informe de la auditoría. Dentro del mismo cada Ministerio e Institución adscrita al Gobierno Central, deberá hacer constar que cumple con la protección de los derechos de autor relativos a los programas de cómputo. También, deberá presentar el inventario. Mediante el oficio AI SFE 255-2015, del 13 de noviembre de 2015, la Auditoría Interna comunicó el Plan Anual de Labores de la Auditoría Interna del Servicio Fitosanitario del Estado (SFE) para el año 2016. Como parte de dicho plan, se destinaron recursos para realizar el estudio especial de auditoría relacionado con la “Evaluación del sistema de control interno en materia de tecnologías de la información”, a fin de determinar el grado de cumplimiento de lo dispuesto en el citado Decreto Ejecutivo N.° 37549-JP. Por medio del proceso de contratación administrativa N.° 2016CD- 000009-0010100001, se adquirieron los servicios de auditoría interna para evaluar el sistema de control interno en materia de tecnologías de la información, específicamente en cuanto al grado de cumplimiento de lo dispuesto en el Decreto Ejecutivo N.° 37549-JP (Reglamento para la Protección de los Programas de Cómputo en los Ministerios e Instituciones Adscritas al Gobierno Central). 1.2. Objetivo Determinar si el sistema de control interno en materia de tecnología de la información, implementado por el Servicio Fitosanitario del Estado (SFE), le permite garantizar de forma razonable el cumplimiento de lo dispuesto en el Decreto Ejecutivo N.° 37549-JP (Reglamento para la Protección de los Programas de Cómputo en los Ministerios e Instituciones Adscritas al Gobierno Central). 1.3. Alcance Se verificó lo siguiente: 1.3.1. Se realizó un levantamiento de inventario (verificación in situ) de todos los equipos de cómputo con que cuenta el SFE, para lo cual se visitaron tanto las oficinas a nivel central como regional. A continuación se detallan las dependencias que fueron visitadas: 05 Servicio Fitosanitario del Estado | Introducción Sede Ubicación Oficinas Centrales Sabana Sur, San José Programa Nacional de Moscas de Pavas, San José la Fruta Laboratorio Central de Aeropuerto Juan Santamaría, Alajuela Diagnóstico de Plagas Puesto Ventanilla Única Plaza Tempo Escazú, San José Estación de Control Fitosanitario Aeropuerto Tobías Bolaños Pavas , San José Estación de Control Fitosanitario Aeropuerto Juan Santamaría, Alajuela Estación de Control Fitosanitario Puerto Limón, Limón Estación de Control Fitosanitario Sixaola, Limón Estación de Control Fitosanitario Los Chiles y Tablillas, Alajuela Estación de Control Fitosanitario Paso Canoas, Puntarenas Estación de Control Fitosanitario Puerto Caldera, Puntarenas Estación de Control Fitosanitario Peñas Blancas, Guanacaste Estación de Control Fitosanitario Aeropuerto Internacional Daniel Oduber Liberia, Guanacaste Puesto de Control Fitosanitario Sabalito, Coto Brus Unidad Regional Chorotega Liberia, Guanacaste Unidad Regional Huetar Norte Ciudad Quesada, San Carlos Alajuela Unidad Regional Brunca Pérez Zeledón, San José Unidad Regional Brunca Piedras Blancas, Osa Unidad Regional Central Sur Puriscal, San José Unidad Regional Huetar Caribe Guápiles, Limón Unidad Regional Central Oriental Cartago, Cartago Unidad Regional Pacífico Central Esparza, Puntarenas Unidad Regional Central Grecia, Alajuela Occidental 1.3.2. Se verificó la suficiencia y pertinencia del sistema de control interno con respecto a: 1.3.2.1. Implementación de procedimientos que regulen el uso e instalación de programas de cómputo, conforme lo dispuesto en el artículo 11 del Decreto Ejecutivo N° 37549-JP. 1.3.2.2. Establecimiento de mecanismos y prácticas administrativas que permitan ejercer control sobre los aspectos contenidos en el artículo 10 del Decreto Ejecutivo N.° 37549-JP, tales como: 06 Servicio Fitosanitario del Estado | Introducción a. Política comprensiva de manejo de programas de cómputo, cuya aplicación garantice de forma efectiva la adquisición y uso adecuado de todos los programas de cómputo. b. Medidas para evaluar el cumplimiento de las disposiciones en materia de derechos de autor, en lo concerniente a la adquisición y uso de programas de cómputo. c. Plan de capacitación orientado al entrenamiento apropiado del personal en materia de derechos de autor y derechos conexos, relacionado con los programas de cómputo, las políticas y procedimientos adoptados para cumplir con ellos. d. Control y registro del licenciamiento e instalación de licencias en los equipos. e. Registro, expediente u hoja histórica por cada uno de los equipos de cómputo en el cual conste, entre otra información, aquella relacionada con la instalación de programas de cómputo o aplicaciones: identificación del equipo, funcionario que autoriza, nombre del programa o aplicación, fecha de instalación y la persona responsable de realizarla. f. Medios utilizados para exhortar a todos los contratistas y proveedores
Recommended publications
  • Translators' Tool
    The Translator’s Tool Box A Computer Primer for Translators by Jost Zetzsche Version 9, December 2010 Copyright © 2010 International Writers’ Group, LLC. All rights reserved. This document, or any part thereof, may not be reproduced or transmitted electronically or by any other means without the prior written permission of International Writers’ Group, LLC. ABBYY FineReader and PDF Transformer are copyrighted by ABBYY Software House. Acrobat, Acrobat Reader, Dreamweaver, FrameMaker, HomeSite, InDesign, Illustrator, PageMaker, Photoshop, and RoboHelp are registered trademarks of Adobe Systems Inc. Acrocheck is copyrighted by acrolinx GmbH. Acronis True Image is a trademark of Acronis, Inc. Across is a trademark of Nero AG. AllChars is copyrighted by Jeroen Laarhoven. ApSIC Xbench and Comparator are copyrighted by ApSIC S.L. Araxis Merge is copyrighted by Araxis Ltd. ASAP Utilities is copyrighted by eGate Internet Solutions. Authoring Memory Tool is copyrighted by Sajan. Belarc Advisor is a trademark of Belarc, Inc. Catalyst and Publisher are trademarks of Alchemy Software Development Ltd. ClipMate is a trademark of Thornsoft Development. ColourProof, ColourTagger, and QA Solution are copyrighted by Yamagata Europe. Complete Word Count is copyrighted by Shauna Kelly. CopyFlow is a trademark of North Atlantic Publishing Systems, Inc. CrossCheck is copyrighted by Global Databases, Ltd. Déjà Vu is a trademark of ATRIL Language Engineering, S.L. Docucom PDF Driver is copyrighted by Zeon Corporation. dtSearch is a trademark of dtSearch Corp. EasyCleaner is a trademark of ToniArts. ExamDiff Pro is a trademark of Prestosoft. EmEditor is copyrighted by Emura Software inc. Error Spy is copyrighted by D.O.G. GmbH. FileHippo is copyrighted by FileHippo.com.
    [Show full text]
  • 2007 Microsoft Office System Service Pack 1 White Paper
    2007 Microsoft Office System Service Pack 1 White Paper Published: December 2007 For the latest information, please see http://office.microsoft.com. Abstract The 2007 Microsoft® Office system Service Pack 1 addresses the issues of most concern to customers: stability, performance, and security. The service pack includes previously released updates and fixes, and incorporates the results of ongoing security research from Microsoft. This white paper details these improvements, explains the expected benefits for home and office users, and provides detailed deployment guidance. Contents Contents ................................................................................................................................................... 1 Introduction ............................................................................................................................................... 3 Business Considerations .......................................................................................................................... 4 Infrastructure for Business ................................................................................................................... 4 Productivity for Employees ................................................................................................................... 4 Security and Privacy Protection ........................................................................................................... 4 Stability ....................................................................................................................................................
    [Show full text]
  • Middleware in Action 2007
    Technology Assessment from Ken North Computing, LLC Middleware in Action Industrial Strength Data Access May 2007 Middleware in Action: Industrial Strength Data Access Table of Contents 1.0 Introduction ............................................................................................................. 2 Mature Technology .........................................................................................................3 Scalability, Interoperability, High Availability ...................................................................5 Components, XML and Services-Oriented Architecture..................................................6 Best-of-Breed Middleware...............................................................................................7 Pay Now or Pay Later .....................................................................................................7 2.0 Architectures for Distributed Computing.................................................................. 8 2.1 Leveraging Infrastructure ........................................................................................ 8 2.2 Multi-Tier, N-Tier Architecture ................................................................................. 9 2.3 Persistence, Client-Server Databases, Distributed Data ....................................... 10 Client-Server SQL Processing ......................................................................................10 Client Libraries ..............................................................................................................
    [Show full text]
  • Issues Fixed by Service Pack 1 (SP1) in the Office 2010 Desktop Applications
    Issues Fixed by Service Pack 1 (SP1) in the Office 2010 Desktop Applications Notes 1. Service Pack 1 includes a rollup of all Cumulative Updates released through April 2011 and all Public Updates released through June 2011. They are not included in the list below, which is specific to changes that are shipping for the first time in SP1. 2. Because we relied on experts of each product to write the text below, the phrasing throughout the table is not 100% consistent. Some of the text simply describes a problem that was fixed by SP1, while other text describes the problem and the new behavior after installing SP1. When reading the list below, please keep in mind that, despite the individual phrasing of each description, all of the issues listed should be fixed in SP1 . 3. In addition to the fixes listed below, SP1 contains additional changes which are less visible, but improve various aspects of the product. This includes reducing the number of crashes, improving security, and fixing other issues that were deemed to be too specific to include in this list. Resources Issues Fixed by Service Pack 1 (SP1) in Microsoft SharePoint 2010 and the Office server products Complete List of all Microsoft Office 2010 Service Pack 1 (SP1) packages (KB 2510690) Complete List of all Microsoft SharePoint 2010 and Office server Service Pack 1 (SP1) packages (KB 2510766) Table of Contents Access Excel Office Shared (Affects Multiple Applications) OneNote Outlook PerformancePoint Dashboard Designer PowerPoint Project Publisher SharePoint Designer SharePoint
    [Show full text]
  • Microsoft Pre-Release Software License Terms for a Virtual Machine Environment Configured by Microsoft Dynamics Lifecycle Services
    MICROSOFT PRE-RELEASE SOFTWARE LICENSE TERMS FOR A VIRTUAL MACHINE ENVIRONMENT CONFIGURED BY MICROSOFT DYNAMICS LIFECYCLE SERVICES These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the software named above, which includes the media on which you received it, if any. BY ACCESSING OR USING THE SOFTWARE, YOU ACCEPT THIS AGREEMENT AND THE SOFTWARE LICENSE TERMS ATTACHED AS EXHIBIT A FOR THE MICROSOFT PRODUCTS. IF YOU DO NOT ACCEPT THIS AGREEMENT, YOU MAY NOT ACCESS OR USE THE SOFTWARE OR THE MICROSOFT PRODUCTS LIST ON EXHBIT A. If you comply with this agreement, you have the rights below. 1. ACCESS AND USE RIGHTS. The terms of this agreement supersede the terms of any Microsoft software license term agreement that you may encounter in this software. You may install and use the software for deployment of Microsoft Dynamics AX 2012 R3 in a virtual machine environment. The virtual machine environment created by this software is for development and testing purposes only. The virtual machine environment configured by the software uses the Microsoft products or services listed in Exhibit A (Microsoft Products). The software license terms governing the Microsoft Products are attached in Exhibit A. You must obtain valid licenses or use rights for each Microsoft Product listed in the attached Exhibit A. 2. PRE-RELEASE SOFTWARE. The software contained in the virtual machine environment is a pre- release configuration. We may change it for the final, commercial version. We also may not release a commercial version.
    [Show full text]
  • Microsoft Camera Codec Pack Registry Error
    Microsoft Camera Codec Pack Registry Error Do you got to uninstall Microsoft Camera Codec Pack or just a feature of their program? Whatever the uninstall error you're getting, there are ways to resolve the the Microsoft Camera Codec Pack from both the system and the Registry. Just FYI, Canon's own Raw Codec, as well as Microsoft's Camera Codec Pack, MaxCachedIcons) Without is more typical for a registry key but several users go According to the error log that you posted, the problem dates from august 10. Jul 21, 2014. Is there an issue with this update as i can't find any other camera codec for Win 8.1, 64 bit anywhere? Thanks. Original title : codec pack error. 3 people had this question I can confirm this exists in the registry but not on the file system. Registry Values: 0 Files/Common Files/Microsoft Shared/Microsoft Camera Codec Pack/MicrosoftRawCodec.dll Update for Microsoft Filter Pack 2.0 (KB2878281) 32-Bit Edition Windows Essentials Codec Pack 5.0 failed to install the following update with error 0x8007045B: Security Update for Microsoft. Describes a Microsoft Camera Codec Pack update for Windows 8.1 and use the update in this package, you do not have to make any changes to the registry. Service Pack 1 Microsoft Camera Codec Pack 'Illegal operation attempted on a Registry key which has been marked for deletion' error message, please. Microsoft Camera Codec Pack Registry Error >>>CLICK HERE<<< Remove Camera Raw (CR2) preview on Windows 8.1 And to remove the preview, I extended vembutech's advice: I had to search for the registry key "Microsoft Camera Codec Pack" as well MySQL 1175 Error While Using Primary Keys.
    [Show full text]
  • Microsoft Windows Server 2008 PKI and Deploying the Ncipher Hardware Security Module
    This is a joint nCipher and IdentIT authored whitepaper Microsoft Windows Server 2008 PKI and Deploying the nCipher Hardware Security Module Abstract This paper discusses the benefits that are unique to deploying the integrated solution of the Windows Server 2008 PKI and the nCipher nShield and netHSM hardware security modules (HSM). This includes the essential concepts and technologies used to deploy a PKI and the best practice security and life cycle key management features provided by nCipher HSMs.. MicrosofT WIndoWs server 2008 PKI and dePloyIng The nCipher hardWare seCurity Module Introduction...............................................................................................................................................................................................3 PKI – A Crucial Component to Securing e-commerce ......................................................................................................................4 Microsoft Windows Server 2008 ...............................................................................................................................................................4 nCipher Hardware Security Modules ......................................................................................................................................................4 Best.Practice.Security.–.nCipher.HSMs.with.Windows.Server.2008.PKI................................................................................5 Overview...............................................................................................................................................................................................................5
    [Show full text]
  • Patch Management Vendor and Application List
    Patch Management Vendor and Application List Vendor Application 7-Zip 7-Zip 7-Zip 3 7-Zip 7-Zip 4 7-Zip 7-Zip 9 7-Zip 7-Zip 15 7-Zip 7-Zip 16 7-Zip 7-Zip 18 Acro Software Acro Software CutePDF Writer 2 Acro Software CutePDF Writer 3 Adobe Adobe Acrobat 5 Adobe Acrobat 6 Adobe Acrobat 7 Adobe Acrobat 8 Adobe Acrobat 9 Adobe Acrobat X Adobe Acrobat XI Adobe Acrobat DC Adobe Acrobat DC 17 Adobe Acrobat DC 18 Adobe Acrobat DC 19 Adobe Adobe Photoshop 11 Adobe Adobe Photoshop 12 Adobe Adobe Photoshop 13 Adobe Adobe Photoshop 15 Adobe Adobe Photoshop 16 Adobe After Effects 13.5 Adobe AIR Adobe AIR 2 Adobe AIR 3 Adobe AIR 4 Adobe AIR 13 Adobe AIR 14 Adobe AIR 15 Adobe AIR 16 Adobe AIR 17 Adobe AIR 18 Adobe AIR 19 Adobe AIR 20 Adobe AIR 21 Adobe AIR 22 Adobe AIR 23 Adobe AIR 24 Adobe AIR 25 Adobe AIR 26 Adobe AIR 27 Adobe AIR 28 Adobe AIR 30 Adobe AIR 31 Adobe AIR 32 Adobe Bridge 4 Adobe Bridge 5 Adobe Bridge CC Adobe Creative Cloud 3 Adobe Creative Cloud 4 Adobe Digital Editions 1 Adobe Digital Editions 2 Adobe Digital Editions 3 Adobe Digital Editions 4 Adobe Distiller 5 Adobe Distiller 6 Adobe Distiller 7 Adobe Dreamweaver 16 Adobe Elements 5 Adobe Elements 6 Adobe Elements 7 Adobe Fireworks CS6 Adobe Flash PPAPI MSI Adobe Flash Plugin MSI Adobe Flash MSI Adobe Flash Plugin Adobe Flash 5 Adobe Flash 6 Adobe Flash Plugin 6 Adobe Flash 7 Adobe Flash Plugin 7 Adobe Flash 8 Adobe Flash Plugin 8 Adobe Flash 9 Adobe Flash Plugin 9 Adobe Flash 10 Adobe Flash Plugin 10 Adobe Flash 11 Adobe Flash Plugin 11 Adobe Flash 12 Adobe Flash Plugin 12 Adobe
    [Show full text]
  • Mcafee Exploit Prevention Content 11535 Release Notes | 2021-06-15
    McAfee Exploit Prevention Content 11535 Release Notes | 2021-06-15 Content package version for – McAfee Endpoint Security Exploit Prevention: 10.6.0.115351 McAfee Host Intrusion Prevention: 8.0.0.115352 1 - Applicable on all versions of McAfee Endpoint Security Exploit Prevention including version 10.7.x 2 - Applicable on all versions of McAfee Host Intrusion Prevention content including Host IPS 8.0 Patch 16. IMPORTANT: McAfee V3 Virus Definition Updates (DATs) version 3786 or above is a mandatory prerequisite for this Exploit prevention content update on McAfee Endpoint Security versions 10.5.x and 10.6.x only. Refer to the below KB for more information: https://kc.mcafee.com/corporate/index?page=content&id=KB91867 IMPORTANT: Either of the below McAfee Host IPS 8.0 Extension packages is a mandatory prerequisite for receiving the new security or policy updates for this content 1. Host IPS 8.0 Patch 15 Extension (build 8.0.0.1334) – Applicable for Host IPS 8.0 Patch 15 and below 2. Host IPS 8.0 Patch 14 Extension Hotfix 114831 (build 8.0.0.1326) – Applicable for Host IPS 8.0 Patch 14 and below Refer to the below KB for more information: https://kc.mcafee.com/corporate/index?page=content&id=KB92596 Minimum Supported New Windows Signatures Product version Host Intrusion Endpoint Security Prevention Exploit Prevention Signature 6204: HTTP Protocol Stack Remote Code Execution Vulnerability 8.0.0 10.6.0 (Patch 13) Description: - HTTP.sys is a web server for ASP.NET Core that only runs on Windows independently or in conjunction with IIS.
    [Show full text]
  • Building Secure ASP.NET Applications: Authentication, Authorization, and Secure Communication
    Building Secure ASP.NET Applications: Authentication, Authorization, and Secure Communication http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/secnetlpMSDN.asp Roadmap J.D. Meier, Alex Mackman, Michael Dunner, and Srinath Vasireddy Microsoft Corporation November 2002 Applies to: Microsoft® .NET Framework version 1.0 ASP.NET Enterprise Services Web services .NET Remoting ADO.NET Visual Studio® .NET SQL™ Server Windows® 2000 Summary: This guide presents a practical, scenario driven approach to designing and building secure ASP.NET applications for Windows 2000 and version 1.0 of the .NET Framework. It focuses on the key elements of authentication, authorization, and secure communication within and across the tiers of distributed .NET Web applications. (This roadmap: 6 printed pages; the entire guide: 608 printed pages) Download Download Building Secure ASP.NET Applications in .pdf format. (1.67 MB, 608 printed pages) Contents What This Guide Is About Part I, Security Models Part II, Application Scenarios Part III, Securing the Tiers Part IV, Reference Who Should Read This Guide? What You Must Know Feedback and Support Collaborators Recommendations and sample code in the guide were built and tested using Visual Studio .NET Version 1.0 and validated on servers running Windows 2000 Advanced Server SP 3, .NET Framework SP 2, and SQL Server 2000 SP 2. What This Guide Is About This guide focuses on: • Authentication (to identify the clients of your application) • Authorization (to provide access controls for those clients) • Secure communication (to ensure that messages remain private and are not altered by unauthorized parties) Why authentication, authorization, and secure communication? Security is a broad topic.
    [Show full text]
  • Client WAP Stack Activex Component
    Winwap Technologies Oy Client WAP Stack ActiveX component Application Programming Interface WAP stack version 2.6 WAP specification version: 2.0 Document dated: 06-Jan-2006 WAP Stack ActiveX http://www.winwap.com Notice of Confidentiality This document contains proprietary and confidential information that belongs to Winwap Technolo- gies Oy. The recipient agrees to maintain this information in confidence and to not reproduce or otherwise disclose this information to any person outside of the group directly responsible for the evaluation of the content. Revision history Date Author Description 06-Jan-2006 S Markelov Initial version of the WAP Stack ActiveX API specification. Preamble The reader of this document should be familiar with all or some of the following in order to fully understand and evaluate the information in this document: • Basic knowledge in programming techniques. • Basic understanding of networking connections and client/server architecture where user- agents retrieve and render information (e.g. Internet browsers and servers with services). • The interaction between a WAP user-agent, a WAP Gateway and a WEB Server. • Basic knowledge in ActiveX technique. c Winwap Technologies Oy 1 WAP Stack ActiveX http://www.winwap.com Contents 1 Normative references2 2 Getting started3 2.1 What is the WAP Stack ActiveX?...........................3 2.2 System requirements..................................4 2.3 Installation.......................................5 2.4 Simple program for Microsoft Visual Basic 6.0....................6 2.5 Simple program for Microsoft Visual C++ 6.0....................8 2.6 Simple program for Microsoft .NET/C#....................... 12 2.7 Simple program for Borland Delphi 7.0........................ 14 3 API specification 16 3.1 Declarations.....................................
    [Show full text]
  • Desktop Icons,Task Bar Screen Tips Files Folders Deleting Naming Saving
    CSE111 Introduction to Computer Applications Lecture 2 Introduction to Windows 7 – Part 1 Prepared by Asst. Prof. Dr. Mohamed KURDI Revised and presented by Asst. Prof. Dr. Samsun M. BAŞARICI Summary of The last Lecture • Computer Hardware & Software • Types of Computers • Basic Parts of a Computer • Decimal, Binary, Octal, and Hexadecimal Numbering Systems. • Primary Storage Devices: ROM, RAM, and Cache Memory • Secondary Storage Devices: Hard Disc, CD, DVD, Blu-ray, HD DVD, and USB Flash Memory. Learning Objectives • Understand what an operating system is and the role it plays. • Know and identify Windows 7 desktop components • Know and apply how to open and explore the control panel. • Know and apply how to personalize the desktop. • Know and identify the components of a window. • Know and apply how to manage multiple windows and multiple monitors. • Know and apply how to change the date & time and set the volume & sound properties. • Understand and apply the different shut down options. • Know and apply how to add a new input language and how to change it. Outlines • What is an Operating System • Windows Desktop Components • The Start Menu • Opening and Exploring the Control Panel • Personalize Your Desktop • Window Components • Working with Multiple Windows • Working with Multiple Monitors • Changing the Date and Time • Setting the Volume and Sound Properties • Changing Windows Interface Language • Changing the Default Input Language • Adding a New Input Language • Displaying Computer Information What Is an Operating System? • An operating system is the most important software that runs on a computer. • It manages the computer's memory, processes, and all of its software and hardware.
    [Show full text]