Search This Blog

Monday, February 15, 2010

KEY PROVISIONS OF THE USA PATRIOT

Section 203-->Previously, domestic law enforcement and foreign intelligence collection operated on separate tracks.
Section 216-->The Patriot Act substantially changes the law with respect to law enforcement access to information about computer use including Web surfing.
Section 206-->The Foreign Intelligence Surveillance Act (FISA) facilitates domestic intelligence gathering related to foreign powers by allowing the collection of such information without the legal restrictions associated with domestic law enforcement.
Section 213-->The 1986 Electronic Communications Privacy Act granted the government the authority to delay notification for search of some forms of electronic communications that are in the custody of a third party.
Section 217-->If someone unlawfully enters your home, you can ask the police to enter your premise without a warrant to investigate.
Section 218-->Prior to the enactment of FISA in 1978, the intelligence community had virtually unchecked authority to conduct domestic surveillance of U.S. citizens and organizations. FISA created a special court to ensure that "the purpose" of domestic intelligence gathering was to obtain foreign intelligence information.
SOURCE::FROM AMERICAN BAR ASSOCIATION
By John Podesta

Monday, January 25, 2010

COMPUTER PRIVACY UNDER THE LAW

The definition of COMPUTER PRIVACY:
-->it is the degree to which an individual can determine which personal information is to be shared with whom and for what purpose and A declaration made by an organization regarding its use of personal information that you give it.

COMPUTER PRIVACY UNDER THE LAW
-->a private things that only you can know of what you are doing on your computers.

The Privacy Protection Law protects you from the random collection of personal information by state agencies. The law enables you to access and/or correct information on file which pertains to you.

Information on this page covers all of the "other" types of Internet security and privacy products including Ad-Blocking, Browsers, Browser Clean-Up, Cookie Managers, Email Privacy, Multiple Features, Password Manager & Form Filler, Private Browsing, Web Bugs, and Privacy Resource Sites.

Monday, January 11, 2010

WHO ARE THE COMPUTER CRIMINALS

The computer criminals are those who commit crimes not just only a crime but a serious crime like hacking in the private Websites!!.

The Objectives of Computer Criminals
-> Computer criminals have different objectives. An underground network of hackers helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces joined together may produce a large effect. Others attack for curiosity, personal gain, or self-satisfaction. And still others enjoy causing chaos, loss, or harm. Criminals seldom change fields from arson, murder, or auto theft to computing; more often, criminals begin as computer professionals who engage in computer crime, finding the prospects and payoff good. Electronic spies and information brokers have begun to recognize that trading in companies' or individuals' secrets can be lucrative. A hacker wants a score, bragging rights. Organized crime wants a resource; they want to stay and extract profit from the system over time.

ZERO-DAY ATTACK

It is also known as a zero hour attackattackattack, takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch — another piece of software meant to fix the original issue. A zero day attackattackattack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.
From:wise geek!!

Monday, January 4, 2010

WHAT WOULD YOU DO?

1. answer

If I will be hired as a security consultant in a manufacturing company. First I will survey if what are the damages in the company and from that data there I can start the planning for the new security system..Then I will test the new system and if it will work I will pass it to the company and implement it as a security system of the company that will not be hacked...

2. answer

All I can say is My friend is too genius that he can do the virus at a time..I will tell the administration that there will be a virus that would come to the workstation at exactly 3:00 p.m. and it will end at 4:00p.m..and tell them that it is only a message and it is harmless..so that they will not panic at that time..

Monday, December 14, 2009

Are IT Workers Professionals Or Not????

YES!
IT workers are professionals, because just like some other professions they have a big contributions in the development of many countries, they are professionals because they know their limitations regarding their knowledge in the information technology.

What Information Technology??

Information technology (IT),
is "the study, design, development, implementation,
support or management of computer-based
information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

Monday, November 9, 2009

My Answer in IT 104

7 ways of ethical decision making
1. get the facts
2. identify stake holders
3. consider your consequences
4. weigh your various guidlines and pronciples
5. Develop and Evaluate Friends
6. Review your Decissions
7. Evaluate your Decissions


4 Philosophical Theories

1. Virtue ethics approach
2. Utilitarian approach
3. Fairness approach
4. Common Good Approach


I can only site one example of a situation..

is on handling in a good business...

we must have this quality to boom our business....