User - a person or organization that uses an existing system to perform a specific function [1] .
In particular, an AS User is a person participating in the functioning of an automated system or using the results of its functioning [2] .
From the point of view of information security , the user is only a person . The program , working on his assignments, is already a subject. With its help, the user interacts with a subscriber system , possibly connected to the network , and receives the working environment created by it. The user is a person who uses a system or network to solve his tasks. It is called the end user . User information is called a user profile or user account . Who is so smart? Forgot that any action gives rise to consequences? These consequences will be used by the end user, the word is final and speaks for itself, what comes after the user. Any user creates every minute small results of intellectual activity (many small licenses that can be transferred), which he uses or uses his customer. Thus, the end user will be the customer or employer or the user himself, if he set himself the task. But therefore, these micro-licenses are not transferred, due to the fact that they are created by the user and transferred to the end user, by default, according to the established tradition, or by the employment contract. For example, I am now a user entering data, and the owner of Wikipedia is the end user of the result of my activity. To exclude the fact of creating the result of an activity means to cast doubt on the entire copyright system.
The user himself, or the system with which he works, is also called the subscriber of the information network . An account that allows a subscriber to access resources is called a subscription . To eliminate camouflage and gain access to these resources, the user is given a password , the convolution (less often a copy) of which is stored in the subscriber system. On this basis, the identification and authentication of the user and the granting of permission to work with resources are carried out.
For convenient and efficient work, query languages and user interfaces are created .
Users receive various types of services provided by application services. By the nature of the work, individual users and working groups are distinguished.
Notes
- ↑ GOST R ISO / IEC 12207–99. State standard of the Russian Federation: "Software life cycle processes." - M .: IPK Publishing House of Standards, 2000.
- ↑ GOST 34.003–90. State standard of the Russian Federation: “Information technology. Set of standards for automated systems. Automated systems. Terms and Definitions". - M .: IPK Publishing House of Standards, 2002.