Sunday, March 22, 2020

Untitled Essay Research Paper BODYINTRODUCTION TO EVOLUTION free essay sample

Untitled Essay, Research Paper BODYINTRODUCTION TO EVOLUTION What is Evolution? Development is the procedure by which all life thingshave developed from crude beings through alterations happening overbillions of old ages, a procedure that includes all animate beings and workss. Precisely howevolution occurs is still a affair of argument, but there are many differenttheories and that it occurs is a scientific fact. Biologists agree that all livingthings come through a long history of alterations shaped by physical andchemical procedures that are still taking topographic point. It is possible that all organismscan be traced back to the beginning of Life from one celled organims.The most direct cogent evidence of development is the scientific discipline of Paleontology, orthe survey of life in the yesteryear through dodo remains or feelings, normally inrock. Changes occur in life beings that serve to increase theiradaptability, for endurance and reproduction, in altering environments.Evolution seemingly has no constitutional way intent. We will write a custom essay sample on Untitled Essay Research Paper BODYINTRODUCTION TO EVOLUTION or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A given sort oforganism may germinate merely when it occurs in a assortment of signifiers differing inhereditary traits, that are passed from parent to offspring. By opportunity, somevarieties prove to be badly adapted to their current environment and thusdisappear, whereas others prove to be adaptative, and their Numberss increase.The riddance of the unfit, or the endurance of the fittest, is known asNatural Selection because it is nature that discards or favours aarticular being. Evolution takes topographic point merely when natural choice operates on apopulation of beings incorporating diverse inheritable signifiers. History Pierre Louis Moreau de Maupertuis ( 1698-1759 ) was the first topropose a general theory of development. He said that familial stuff, dwelling of atoms, was transmitted from parents to offspring. His opinionof the portion played by natural choice had small influence on other naturalists. Until the mid-19th century, naturalists believed that each species wascreated individually, either through a supreme being or through spontaneousgeneration the construct that organisms arose to the full developed from dirt or H2O. Thework of the Swedish naturalist Carolus Linnaeus in progressing the sorting ofbiological beings focused attending on the close similarity between certainspecies. Guess began as to the being of a kind of blood relationshipbetween these species. These inquiries coupled with the emerging scientific disciplines ofgeology and palaeontology gave rise to hypotheses that the life-forms of the dayevolved from earlier signifiers through a procedure of alteration. Highly of import wasthe realisation that different beds of stone represented different clip periods andthat each bed had a typical set of dodos of life-forms that had lived in the yesteryear. Lamarckism Jean Baptiste Lamarck was one of several theoreticians who proposed anevolutionary theory based on the usage and neglect of variety meats. Lamarck stated thatan single acquires traits during its life-time and that such traits are in some wayput into the familial stuff and passed to the following coevals. Thiswas an effort to explicate how a species could alter bit by bit over time.According to Lamarck, camelopard, for illustration, have long cervixs because for manygenerations single giraffes stretched to make the uppermost foliages of trees, ineach coevals the camelopard added some length to their cervixs, and they passed thison to their progeny. New variety meats arise from new demands and develop inthe extent that they are used, neglect of variety meats leads totheir disappearing. Subsequently, the scientific discipline of Genetics disproved Lamarck # 8217 ; s theory, itwas found that acquired traits can non be inherited. Malthus Thomas Robert Malthus, an English reverend, through his work An Essayon the Principle of Population, had a great influence in directing naturalists towarda theory of natural choice. Malthus proposed that environmental factors such asfamine and disease limited population growing. Darwin After more than 20 old ages of observation and experiment, Charles Darwinproposed his theory of development through natural choice to the Linnean Societyof London in 1858. He presented his find along with another Englishnaturalist, Alfred Russel Wallace, who independently discovered natural choice atabout the same clip. The undermentioned twelvemonth Darwin published his full theory, supported with tremendous grounds, in On the Origin of Species. Geneticss The part of genetic sciences to the apprehension of development hasbeen the account of the heritage in persons of the same species. GregorMendel discovered the basic rules of heritage in 1865, but his work wasunknown to Darwin. Mendel # 8217 ; s work was rediscovered by other scientists around1900. From that clip to 1925 the scientific discipline of genetic sciences developed quickly, and manyof Darwin # 8217 ; s thoughts about the heritage of fluctuations were found to be incorrect.Only since 1925 has natural choice once more been recognized as essentialin development. The modern theory of development combines the findings of moderngenetics with the basic model supplied by Darwin and Wallace, making thebasic rule of Population Genetics. Modern population genetic sciences was developedlargely during the 1930s and # 8217 ; 40s by the mathematicians J. B. S. Haldane and R. A.Fisher and by the life scientists Theodosius Dobzhansky, Julian Huxley, Ernst Mayr, George Gaylord SIMPSON, Sewall Wright, Berhard Rensch, and G. LedyardStebbins. Harmonizing to the theory, variableness among persons in a population ofsexually reproducing beings is produced by mutant and geneticrecombination. The resulting familial variableness is capable to natural choice in theenvironment. Population GENETICS The word population is used in a particular sense to depict development. Thestudy of individual persons provides few hints as to the possible results ofevolution because individual persons can non germinate in their life-time. An individualrepresents a shop of cistrons that participates in development merely when those cistrons arepassed on to farther coevalss, or populations. The cistron is the basic unit in thecell for conveying familial features to offspring. Persons are unitsupon which natural choice operates, but the tendency of development can be tracedthrough clip merely for groups of crossbreeding persons, populations can beanalyzed statistically and their development predicted in footings of norm Numberss. The Hardy-Weinberg jurisprudence, which was discovered independently in 1908 bya British mathematician, Godfrey H. Hardy, and a German doctor, WilhelmWeinberg, provides a criterion for quantitatively mensurating the extent ofevolutionary alteration in a population. The jurisprudence states that the cistron frequences, orratios of different cistrons in a population, will stay changeless unless they arechanged by outside forces, such as selective reproduction and mutant. Thisdiscovery reestablished natural choice as an evolutionary force. Comparing theactual cistron frequences observed in a population with the frequences predicted, bythe Hardy-Weinberg jurisprudence gives a numerical step of how far the populationdeviates from a nonevolving province called the Hardy-Weinberg equilibrium. Given alarge, indiscriminately engendering population, the Hardy-Weinberg equilibrium will holdtrue, because it depends on the Torahs of chance. Changes are produced in thegene pool through mutants, cistron flow, familial impetus, and natural choice. Mutant A mutant is an inheritable alteration in the character of a cistron. Mutationsmost frequently occur spontaneously, but they may be induced by some externalstimulus, such as irradiation or certain chemicals. The rate of mutant in worlds isextremely low ; however, the figure of cistrons in every sex cell, is so big thatthe chance is high for at least one cistron to transport a mutant. Gene Flow New cistrons can be introduced into a population through new breedingorganisms or gametes from another population, as in works pollen. Gene flow canwork against the procedures of natural choice. Familial Drift A alteration in the cistron pool due to opportunity is called familial impetus. Thefrequency of loss is greater the smaller the population. Therefore, in little populationsthere is a inclination for less fluctuation because couples are more similar genetically. Natural Choice Over a period of clip natural choice will ensue in alterations in thefrequency of allelomorphs in the cistron pool, or greater divergence from the nonevolvingstate, represented by the Hardy-Weinberg equilibrium. New SPECIES New species may germinate either by the alteration of one species to another orby the splitting of one species into two or more new species. Splitting, thepredominant manner of species formation, consequences from the geographical isolation ofpopulations of species. Isolated populations undergo different mutants, andselection force per unit areas and may germinate along different lines. If the isolation is sufficientto prevent crossbreeding with other populations, these differences may becomeextensive plenty to set up a new species. The evolutionary alterations broughtabout by isolation include differences in the generative systems of the group.When a individual group of organisms diversifies over clip into several subgroups byexpanding into the available niches of a new environment, it is said to undergoAdaptive Radiation. Darwin # 8217 ; s Finches, in the Galapagos Islands, West of Ecuador, illustrateadaptive radiation. They were likely the first land birds to make the islands, and, in the absence of competition, they occupied several ecological home grounds anddiverged along several different lines. Such forms of divergency are reflected inthe life scientists # 8217 ; strategy of categorization of beings, which groups together animalsthat have common features. An adaptative radiation followed the foremost conquestof land by craniates. Natural choice can besides take populations of different species populating insimilar environments or holding similar ways of life to germinate similar characteristics.This is called convergent development and reflects the similar selective force per unit area ofsimilar environments. Examples of convergent development are the oculus in cephalodmollusks, such as the octopus, and in craniates ; wings in insects, nonextant flyingreptiles, birds, and chiropterans ; and the flipperlike extremities of the sea polo-neck ( reptilian ) , penguin ( bird ) , and seahorse ( mammal ) . MOLECULAR EVOLUTION An spring of new grounds back uping development has come in the 20thcentury from molecular biological science, an unknown field in Darwin # 8217 ; s twenty-four hours. Thefundamental dogma of molecular biological science is that cistrons are coded sequences of theDNA molecule in the chromosome and that a cistron codifications for a precise sequence ofamino acids in a protein. Mutants alter DNA chemically, taking to modified ornew proteins. Over evolutionary clip, proteins have had histories that are astraceable as those of large-scale constructions such as castanetss and dentitions. The farther inthe yesteryear that some hereditary stock diverged into contemporary species, the moreevident are the alterations in the amino-acid sequences of the proteins of thecontemporary species. PLANT EVOLUTION Biologists believe that workss arose from the multicellular green algae ( phylum Chlorophyta ) that invaded the land about 1.2 billion old ages ago. Evidence isbased on modern green algae holding in common with modern workss the samephotosynthetic pigments, cell walls of cellulose, and multicell signifiers holding a lifecycle characterized by Alternation Of Generations. Photosynthesis about certainlydeveloped foremost in bacterium. The green algae may hold been preadapted to land. The two major groups of workss are the nonvascular plants and the vascular plants ; the two groups most likely diverged from one common group of workss. Thebryophytes, which lack complex carry oning systems, are little and are found inmoist countries. The vascular plant s are workss with efficient carry oning systems ; theydominate the landscape today. The seed is the major development in vascular plants, and it is most of import for endurance on land. Fossil grounds indicates that land workss foremost appeared during the SilurianPeriod of the Paleozoic Era ( 425-400 million old ages ago ) and diversified in theDevonian Period. Near the terminal of the Carboniferous Period, fernlike workss hadseedlike constructions. At the stopping point of the Permian Period, when the land became drierand colder, seed workss gained an evolutionary advantage and became the dominantplants. Plant foliages have a broad scope of forms and sizes, and some fluctuations ofleaves are versions to the environment ; for illustration, little, leathery foliages foundon workss in dry climes are able to conserve H2O and gaining control less visible radiation. Besides, early flowering plants adapted to seasonal H2O deficits by dropping their leavesduring periods of drouth. Evidence FOR Development The Fossil Record has of import penetrations into the history of life. The orderof dodos, get downing at the underside and lifting upward in graded stone, corresponds totheir age, from oldest to youngest. Deep Welsh stones, up to 570 million old ages old, contain the remains ofvarious marine invertebrate animate beings, sponges, Portuguese man-of-war, worms, shellfish, starfish, and crustaceans. These invertebrates were already so good developed that they musthave become differentiated during the long period predating the Welsh. Somefossil-bearing stones lying good below the oldest Welsh strata contain imprints ofjellyfish, paths of worms, and hints of soft corals and other animate beings of uncertainnature. Paleozoic Waterss were dominated by arthropods called trilobites and largescorpionlike signifiers called eurypterids. Common in all Paleozoic periods ( 570-230million old ages ago ) were the nautiloid, which are related to the modern nautilus, andthe lamp shells, or brachiopods. The uneven graptolites, colonial animate beings whosecarbonaceous remains resemble pencil Markss, attained the extremum of theirdevelopment in the Ordovician Period ( 500-430 million old ages ago ) and thenabruptly declined. In the mid-1980s research workers found fossil carnal tunnels inrocks of the Ordovician Period ; these hint dodos indicate that terrestrialecosystems may hold evolved sooner than was one time thought. Many of the Paleozoic Marine invertebrate groups either became nonextant ordeclined aggressively in Numberss before the Mesozoic Era ( 230-65 million old ages ago ) .During the Mesozoic, shelled ammonites flourished in the seas, and insects andreptiles were the prevailing land animate beings. At the stopping point of the Mesozoic the once-successful Marine ammonites perished and the reptilian dynasty collapsed, givingway to birds and mammals. Insects have continued to boom and hold differentiatedinto a astonishing figure of species. During the class of development works and animate being groups have interacted toone another # 8217 ; s advantage. For illustration, as blossoming workss have become lessdependent on air current for pollenation, a great assortment of insects have emerged asspecialists in transporting pollen. The colourss and aromas of flowers hold evolvedas versions to pull insects. Birds, which feed on seeds, fruits, and buds, haveevolved quickly in confidant association with the blossoming workss. The emergence ofherbivorous mammals has coincided with the widespread distribution of grasses, and the herbivorous mammals in bend have contributed to the development ofcarnivorous mammals. Fish and Amphibians During the Devonian Period ( 390-340 million old ages ago ) the huge land areasof the Earth were mostly populated by carnal life, salvage for rare animals likescorpions and millepedes. The seas, nevertheless, were crowded with a assortment ofinvertebrate animate beings. The fresh and salt Waterss besides contained cartilaginous andbony Fish. From one of the many groups of fish inhabiting pools and swampsemerged the first land craniates, get downing the craniates on their conquering of allavailable tellurian home grounds. Among the legion Devonian aquatic signifiers were the Crossopterygii, lobe-finned fish that possessed the ability to quaff air when they rose to the surface.These ancient air- external respiration fish represent the stock from which the foremost landvertebrates, the amphibious vehicles, were derived. Scientists continue to speculate aboutwhat led to venture onto land. The lobefins that migrated onto land wereonly crudely adapted for tellurian being, but because they did non encountercompetitors, they survived. Lobe-finned fish did, nevertheless, possess certain features that servedthem good in their new environment, including crude lungs and internal anterior nariss, both of which are indispensable for take a breathing out of the water.Such features, called preadaptations, did non develop because the others werepreparing to migrate to the land ; they were already present by accident and becameselected traits merely when they imparted an advantage to the fish on land. The early land-dwelling amphibious vehicles were thin-bodied with fishlike dress suits, butthey had limbs capable of motive power on land. These limbs likely developedfrom the sidelong fives, which contained heavy lobes that in bend contained bonyelements. The antediluvian amphibians neer became wholly adapted for being onland, nevertheless. They spent much of their lives in the H2O, and their moderndescendants, the salamanders, newts, toads, and toads # 8211 ; still must return to H2O todeposit their eggs. The riddance of a water-dwelling phase, which was achievedby the reptilians, represented a major evolutionary progress. The Reptilian Age Possibly the most of import factor lending to the going of reptilesfrom the amphibious vehicles was the development of a shell- covered egg that could be laidon land. This development enabled the reptilians to distribute throughout the Earth # 8217 ; slandmasses in one of the most dramatic adaptative radiations in biological history. Like the eggs of birds, which developed subsequently, reptilian eggs contain acomplex series of membranes that protect and nourish the embryo and aid itbreathe. The infinite between the embryo and the amniotic sac is filled with an amnioticfluid that resembles seawater ; a similar fluid is found in the foetuss of mammals, including worlds. This fact has been interpreted as an indicant that life originatedin the sea and that the balance of salts in assorted organic structure fluids did non alteration verymuch in development. The membranes found in the human embryo are essentiallysimilar to those in reptilian and bird eggs. The human yolk pouch remains little andfunctionless, and the exhibits have no development in the human embryo.Nevertheless, the presence of a yolk pouch and allantois in the human embryo is oneof the strongest pieces of grounds documenting the evolutionary relationshipsamong the widely differing sorts of craniates. This suggests that mammals, including worlds, are descended from animate beings that reproduced by agencies ofexternally laid eggs that were rich in yolk. The reptilians, and in peculiar the dinosaurs, were the dominant landanimals of the Earth for good over 100 million old ages. The Mesozoic Era, duringwhich the reptilians thrived, is frequently referred to as the Age of Reptiles. In footings of evolutionary success, the larger the animate being, the greater thelikelihood that the animate being will keep a changeless Body Temperature independentof the environmental temperature. Birds and mammals, for illustration, bring forth andcontrol their ain organic structure heat through internal metabolic activities ( a province known asendothermy, or warm-bloodedness ) , whereas today # 8217 ; s reptilians are thermally unstable ( inhuman ) , modulating their organic structure temperatures by behavioural activities ( thephenomenon of ectothermy ) . Most scientists regard dinosaurs as lumbering, oversized, inhuman lizards, instead than big, lively, animate beings with fast metabolicrates ; some life scientists, nevertheless # 8211 ; notably Robert T. Bakker of The Johns HopkinsUniversity # 8211 ; assert that a immense dinosaur could non perchance have warmed up everymorning on a cheery stone and must hold relied on internal heat production. The reptilian dynasty collapsed before the stopping point of the Mesozoic Era.Relatively few of the Mesozoic reptilians have survived to modern times ; thoseremaining include the Crocodile, Lizard, serpent, and polo-neck. The cause of the declineand decease of the big array of reptilians is unknown, but their disappearing isusually attributed to some extremist alteration in environmental conditions. Like the elephantine reptilians, most line of descents of beings have finally becomeextinct, although some have non changed appreciably in 1000000s of old ages. Theopossum, for illustration, has survived about unchanged since the late CretaceousPeriod ( more than 65 million old ages ago ) , and the Horseshoe Crab, Limulus, is notvery different from fossils 500 million old ages old. We have no account for theunexpected stableness of such beings ; possibly they have achieved an almostperfect accommodation to a unchanging environment. Such stable signifiers, nevertheless, arenot at all dominant in the universe today. The human species, one of the dominantmodern life signifiers, has evolved quickly in a really short clip. The Rise of Mammals The diminution of the reptilians provided evolutionary chances for birds andmammals. Small and invisible during the Mesozoic Era, mammals rose tounquestionable laterality during the Cenozoic Era ( get downing 65 million yearsago ) . The mammals diversified into Marine signifiers, such as the giant, mahimahi, seal, and seahorse ; fossorial ( adapted to delving ) signifiers populating underground, such asthe mole ; winging and gliding animate beings, such as the chiropteran and winging squirrel ; andcursorial animate beings ( adapted for running ) , such as the Equus caballus. These variousmammalian groups are good adapted to their different manners of life, particularly bytheir extremities, which developed from common ascendants to go specializedfor swimming, flight, and motion on land. Although there is small superficial resemblance among the arm of a individual, the fin of a giant, and the wing of a chiropteran, a closer comparing of their skeletalelements shows that, bone for bone, they are structurally similar. Biologists regardsuch structural similarities, or homologies, as grounds of evolutionary relationships.The homologous limb castanetss of all four-legged craniates, for illustration, areassumed to be derived from the limb castanetss of a common ascendant. Biologists arecareful to separate such homologous characteristics from what they call analogousfeatures, which perform similar maps but are structurally different. Forexample, the wing of a bird and the wing of a butterfly are correspondent ; both areused for flight, but they are wholly different structurally. Analogous constructions donot indicate evolutionary relationships. Closely related dodos preserved in uninterrupted sequences of stone stratahave allowed evolutionists to follow in item the development of many species as it hasoccurred over several million old ages. The lineage of the Equus caballus can be tracedthrough 1000s of dodo remains to a little terrier-sized animate being with four toes onthe front pess and three toes on the hind pess. This ascendant lived in the EoceneEpoch, approximately 54 million old ages ago. From dodos in the higher beds of stratifiedrock, the Equus caballus is found to hold bit by bit acquired its modern signifier by eventuallyevolving to a one-toed Equus caballus about like modern Equus caballuss and eventually to the modernhorse, which dates back about 1 million old ages. Decision TO EVOLUTION Although we are non wholly certain that development is how we got the manner weare now, it is a strong belief among many people today, and scientist are findingmore and more grounds to endorse up the evolutionary theory.

Thursday, March 5, 2020

The information systems identity crisis essayEssay Writing Service

The information systems identity crisis essayEssay Writing Service The information systems identity crisis essay The information systems identity crisis essayFor thousands of years already people need to exist in communities, this means, that communication is the key element, connecting them and coordinating their cooperation. Along with technological development in all our life spheres, the development of communication means was also moving quickly forward. Such inventions, as radio, television, telephone played vitally important role for making the process of communication quicker and easier. The greatest breakthrough in the field of communication technologies was brought without any doubts by the creation of Internet and all the means, which can be used with its help. Internet nowadays is one of the perfectly suitable and equipped means for storing and transferring any kind of information, including text, video, photos. The system is initially worked out as demanding the authorized access to any type of data, however, the preserving of privacy and security still remains the key task for our digital world. â€Å"Unauthorized access can be detrimental, resulting in financial loss, the release of confidential information, damages to computer systems, costly staff time to restore operations, diminished reputation, and embarrassing changes to a website by cyber vandalism† (Alter, 2006:12). Computer networks are in use almost in all businesses and organizations, state and private ones. This is the main reason, why high-skilled professionals in the field of computer network security have become an integral part of any organization. Further in this paper we are going to study the notion of information system, the possible ways of attacking it along with various security means, which need to be applied, to guarantee its operability and security.Along with development of Internet and its resources, the notion â€Å"information systems† appeared; it is generally defined as â€Å"the study of complementary networks of hardware and software that people and organizati ons use to collect, filter, process, create, and distribute data† (Agarwal and Lucas, 2005: 2). Internet contributed to development of strong connection between the computer science and business, giving the possibility to use various computer resources and algorithmic processes for optimizing the work of business organizations. Computer information systems â€Å"is a field studying computers and algorithmic processes, including their principles, their software and hardware designs, their applications, and their impact on society, while IS emphasizes functionality over design† (Alter, 2006:16).In this case the information systems serve not only as means of exchanging of the necessary information, but also as a way to support all the processes in all business spheres. Computers and software are constantly involved into working out the business plans, into the actions for realization of these plans, in retrieving the information and manipulating with it and so on.Long befo re the development of computer systems, various systematic approaches were considered and worked out with the aim to control the information flow as well as ensuring its secure flow, transmission and storage. Nowadays, the security of computer systems, information systems is of the highest importance for all businesses. There are a numerous ways of protecting the information, but first we are going to start from the main types of attacks, which could be done with the aim of retrieving the unauthorized access to information. The most general feature of all computer attacks is the usage of technical or human weak points. To human weaknesses usually belong the mistakes, made by inexperienced users, bad physical security for example. Technical weaknesses include not sufficient protection features, drawbacks of implementation and so on.It is necessary to mention from the very beginning, that it is close to impossible to enumerate and list all the possible technical attacks. This happens because there are certain attack patterns, which could be used in multiple combinations and are limited only by the inventiveness of the attackers. Usually, serious attacks involve several techniques at a time. So, we are going to study only the general ones.One of the first examples of attacks is the so-called â€Å"sniffing†, which means the presence of an uninvited listener, who doesn’t detect himself. Sometimes, it is substituted by the term â€Å"eavesdropping†. This attack type is based on the usage of a â€Å"covert channel†, being an additional channel, not foreseen in the initial version of the program, thus violating its security.Reply is another form of attack, which involves inserting of information into the system and passing this information to the final point, as a result sending an attack towards the system. It is often used in order to get the access to some information, via making the receiver refer the attacker to a trusted party.The pr ocess of transition of any data is also rather vulnerable to attacks, often the data can be modified and the necessary password is retrieved. Attack of data in the process of transferring is more sophisticated as attacks against persistent stores, it belongs to the category of â€Å"file manipulation† attacks.Automatic detection of attack is often applied as the means, for securing the systems, at the same time it can be used as the means for intrusion, if only the response of the intrusion detection system is delayed and there is enough time for retrieving the necessary data (Rainer and Cegielski, 2009: 12). This type of attack got the name denial of service.Forced restart of re-installation can be used in case of necessity to introduce some malicious software. When the system requires the re-start because of some mistake, this software is installed during the process. This technique is widely used, because the general rule confirms, that backup resources usually are less s ecure, than the initial resources.â€Å"The term hijacking is usually used to refer to an attack that involves disconnecting a server resource in some manner from a resource channel and replacing it with a different server resource† (Rainer and Cegielski, 2009: 13).We have listed only some most well-known and used techniques for breaking the security of information. From this list, we can already assume, that there are numerous ways to get, to transfer and to delete the needed information, without permission of the official holder of this information. Thus this long list only confirms the idea, that strong information security system, operations, resources are remaining actual for any information storage, including personal data, as well as any business or social storages.Passing to the research of the ways to secure information, we need to define the notion of information security in general. â€Å"Information security is the practice of defending information from unauthori zed access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction (Alter, 2006:23). Usually two key components of information security are pointed out: information technology security and information assurance. The first one includes the set of means, worked out by the IT security specialists, in order to protect various types of data for large business organizations, able to stop any kind of malicious attacks. Information assurance is used to save the information from being lost due to some critical situations, for example malfunction of a computer or server, natural disasters and so on. One of the methods here is to create a backup possibility for all important information. Both components are vitally important for normal operation of most military, health care, financial institutions, various types of businesses and finally for sustaining of privacy of all people, using computers.Usual people are used to the advantages brought by Internet, unfor tunately rather often they forget about the necessary steps to ensure their security. At the same time there are enough individuals, who see the advantages of Internet in the frames of some criminal activities. The simplest things, which people should always do, is to control their bank accounts and credit cards, be careful about giving out their personal information, such as telephone, address, personal data to some unknown online resources.Certainly even if all these steps are taken, they can not guarantee complete security for information and data. In order to resist constant illegal attacks a whole system of Internet security was worked out to deal with â€Å"hacking, where unauthorized users gain access to computer systems, email accounts or websites; viruses and other malicious software (malware), which can damage data or make systems vulnerable to other threats; and identity theft, where hackers steal personal details such as credit card numbers and bank account informationà ¢â‚¬  (Agarwal and Lucas, 2005: 2).Most of Internet users are used to the word â€Å"virus†; in fact this notion includes the malware, such as viruses, worms and Trojans. Viruses and worms are able to spread from one computer to the other via downloading of some data or using USB flashcards without previous checks. Trojans are used to steal the needed information such as passwords or financial data. In order to protect the computers from the above-described problems it is necessary to install the corresponding anti-malware  Firewalls also help to control the incoming information, based on special rules, they define the dangerous information, such as malicious codes for example, also they are able to prevent uncovering of the information from networks.All Internet users need to install browser to use the Internet resources, some of them have security flaws, that’s why it is so important to choose the secure one.The most widely used way of transmitting of information today is electronic mail. In order to secure the information, which is sent, it is necessary to use special anti-malware applications. Thorough control of the incoming emails should help not to bring virus or worms to ones personal computer.Most of the businesses, private organizations, as well as state institutions have their own web sites, this is the easiest way to present information and to attract people, clients. Often the owners of websites suffer from DoS attacks – Denial of service. This type of attack makes the usage and access to the web site impossible. Firewalls and special systems, called â€Å"cleans pipes† are able to solve this problem (Agarwal and Lucas, 2005: 3-4).The last, but not the least important way of securing one’s information is controlling the data by the user himself. No anti-malware or firewalls are able to save the system and the stored information, if a user gives out the passwords, not carefully treating his information.  Over all, in this paper were have studies the key notions, related to the modern information systems, including the nowadays ways of storing and transferring of information; we have stopped at some most widely used techniques of breaking the system security and ways of attacking the information storages; finally, we discussed the possible technical ways of securing information, along with influence of human factor.