Monday, January 25, 2010

What is privacy protection on the Law?



While currently there is no national law to protect the privacy of the information you share online, federal law and state law do offer some protection to various kinds of personal information collected about you. At the national level, Congress has enacted laws as it perceived the need to arise. Therefore, you will see from the list below that you have privacy rights in specific kinds of information—information maintained about you in the health care system, your education records, the record of your video rentals, to name a few.


At the same time, the states have exercised their strong interest in protecting their citizens as consumers, patients, students and participants in civic life. Some states have enacted protections beyond those provided in national law; others offer more limited protection.

www.consumerprivacyguide.org/law/ - Cached - Similar



What is Privacy in Computer?





Nowadays we use computers and the Internet everywhere - we do our banking, read books, find different kinds of information, plan holidays and more. The list is endless. But on the other side Internet is full of potential risk to our privacy and security. It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address. Everyone has an IP address to communicate on the Internet, IP address is like a telephone number or mailing address. Using your IP it is possible to know your country, city, internet provider and even physical address.
While surfing the Internet browsers keep tracks of our Internet activity in order to provide a more pleasant computer and surfing experience. But these history tracks can compromise our privacy and provide an easy way for others to see what web sites you visited, what you have been searching, downloading, viewing, etc.
Windows and different applications we use keep tracks about your computer activity in order to provide a more pleasant computer experience. But those history tracks can also compromise our privacy and show what you have been doing, searching, downloading, running, saving, what documents and files you have just opened etc.
So while there are lots of things that we have gained from the computer revolution there is a price we have to pay. And the price is our computer privacy. Of course there is no simple solution for this problem. But inactivity is also impossible. There are some simple steps everyone could do. There are different tools available to help us maintain our privacy - anonymous surfing tools, encryption software, clear history software. When your PC is equipped with privacy software, it has the greatest chance of surviving privacy or security attacks.
www.askwebhosting.com/article/129/Computer-privacy.html - Cached - Similar



Monday, January 18, 2010

Who are the computer criminals and what are ther objectives?

Some are mentally deranged, overtly hostile, or extremely committed to a cause, and they attack computers as a symbol. Others are ordinary people tempted by personal profit, revenge, challenge, advancement, or job security. The computer criminals attack the programs.


Objective:


The computer criminals seldom change fields from arson, murder, or auto theft to computing; more often, criminals begin as computer professionals who engage in computer crime, finding the prospects and payoff good. Electronic spies and information brokers have begun to recognize that trading in companies' or individuals' secrets can be lucrative.

www.crime-research.org/library/Golubev_nov1.html

ZERO-DAYS-ATTACK

A zero day attack, also known as a zero hour attack, takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch — another piece of software meant to fix the original issue. A zero day attack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.

en.wikipedia.org/wiki/Zero_day_attack

Monday, January 11, 2010

What would you do?


1. You have just been hired as an IT security consultant to"fix the security problem" at a manufacturing company. The company has been hacked mercilessly over the last six months w/ three of the attacks making headlines for the negative impact they have in the firm & its customers. You have been given 90 days an a budget of $1 million where would you begin, and what steps would you take to fix the problem
?

-- For me i accept the opportunity that he give me and i give my best being a IT security consultant to fix the security problem and to prove my ability that i have.

2. Your friend just told you that he is developing a worm to attack the administrative system at your college. The worm is "harmless" & will simply cause a massage "Lets Party" to be displayed on the workstations on Friday afternoon at 3 pm. By 4 pm, the virus will erase itself and destroy all the evidence of its presence, what would you say or do?

--if my friend had told me that he is developing worm which will attack the administrative system at our college, i told hem that this kind of activity shows nothing but foolishness.

Monday, January 4, 2010

7 STEPS of ethical decision making

Get the fact:Your friend was hated your parent.Everything he doesn't make any sense for your parent
Identify the stake holder:But still he wanted to love you even his parent he did not like you.she fight his love to you.
Consequences of your decision:You chose your own decision and you have no permeation your parent that's why you field.
Way various guidelines and principle:But then you realize that you can live your mother alone and was mesmerize by the tender love and care.
Develop evaluate option:You wanted to go with him but could you do that when your mother cares everything about you and always here behind you.
Review your decision:Make your own decision to create your own life.
Evaluating the result of your decision:You do in a right time when your someone waiting for you.