Monday, January 25, 2010
COMPUTER PRIVACY
Concerning privacy laws of the United States, privacy is not guaranteed per se by the Constitution of the United States. The Supreme Court of the United States has found that other guarantees have "penumbras" that implicitly grant a right to privacy against government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the right of freedom of speech granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the U.S. by the Privacy Act of 1974, and various state laws.It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address
PRIVACY LAW
Concerning privacy laws of the United States, privacy is not guaranteed per se by the Constitution of the United States. The Supreme Court of the United States has found that other guarantees have "penumbras" that implicitly grant a right to privacy against government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the right of freedom of speech granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the U.S. by the Privacy Act of 1974, and various state laws.
PRIVACY PROTECTION
Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.
In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. In support of this view, Jensen and Potts showed that most privacy policies are above the reading level of the average person ] Therefore, this approach advocates greater government definition and enforcement of privacy standards.
What is Privacy?
Privacy is being private; seclusion;secrecy;
one's private life.Not open or controlled by the public;for an individual
person;not holding public office;secret. dd
one's private life.Not open or controlled by the public;for an individual
person;not holding public office;secret. dd
Monday, January 18, 2010
Who are computer criminals and their object?
Some computer criminals are mean and sinister type.
But many more wear business suits,have university degrees,
and appear to be pillars of their communities.
No single profile captures the characteristics of a"typical"
computer criminal,and many who fit the profile are not
criminals at all.
But many more wear business suits,have university degrees,
and appear to be pillars of their communities.
No single profile captures the characteristics of a"typical"
computer criminal,and many who fit the profile are not
criminals at all.
Zero-Day Attack
Zero-Day Attack takes place before the security software developers knows about a vulnerability or has been able to repair it.
A zero-day attack will take advantage of that problem before a patch has been created.
A programmer can create a virus or worm that exploits that vulnerability and harms computer systems in a variety ways.
A zero-day attack will take advantage of that problem before a patch has been created.
A programmer can create a virus or worm that exploits that vulnerability and harms computer systems in a variety ways.
♣What would I say or do♣
1. If I have a problem like this, my IT security consultant was hacked,
and i have only giving a 90 days to fixed the problem $1,000,000.
First I will talk to my boss and to my co-worker that rt was a accidentally
happen, not a traitor.Then next I will check my IT security that it was
not a easy and I will sure that my security consultant is new.
2.My friend is to wise and genius that he can do the virus a the
all time that he's traitor to the company. I will tell the
administration that there will be a virus that would come to the world station
at exactly 3:00pm and it will end 4:00pm and tell them that it is only
a message.
and i have only giving a 90 days to fixed the problem $1,000,000.
First I will talk to my boss and to my co-worker that rt was a accidentally
happen, not a traitor.Then next I will check my IT security that it was
not a easy and I will sure that my security consultant is new.
2.My friend is to wise and genius that he can do the virus a the
all time that he's traitor to the company. I will tell the
administration that there will be a virus that would come to the world station
at exactly 3:00pm and it will end 4:00pm and tell them that it is only
a message.