"Privacy Protection and the Law"
----->Personal Privacy Protection Law protects you from the random collection of personal information by state agencies. The law enables you to access and/or correct information on file which pertains to you. It also regulates disclosure of personal information to persons authorized by law to have access for official use.In this privacy law is the area of law concerned with the protection and preservation of the privacy rights of individuals. Increasingly, governments and other public as well as private organizations collect vast amounts of personal information about individuals for a variety of purposes.
Monday, January 25, 2010
What is Computer Privacy?
"What is computer privacy?"
--->We use computers and the Internet everywhere - we do our banking, read books, find different kinds of information, plan holidays and more.But on the other side Internet is full of potential risk to our privacy and security. It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address. So while there are lots of things that we have gained from the computer revolution there is a price we have to pay. And the price is our computer privacy. Of course there is no simple solution for this problem. But inactivity is also impossible.
Monday, January 11, 2010
computer criminals and their objectives
Computer Criminals
---->The Web, some say, has been turned into an operating system for criminals. Computer viruses that hijack PCs and turn them into electronic robots, or “bots,” have become the killer app. The operation of networks of hijacked computers is so lucrative that hackers are actually fighting electronic wars over them.New hacker techniques make these virus attacks so subtle that there is no way you would know your computer is a criminal. And there is a growing sense among security experts that hackers have gained the upper hand. Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it.
---->The Web, some say, has been turned into an operating system for criminals. Computer viruses that hijack PCs and turn them into electronic robots, or “bots,” have become the killer app. The operation of networks of hijacked computers is so lucrative that hackers are actually fighting electronic wars over them.New hacker techniques make these virus attacks so subtle that there is no way you would know your computer is a criminal. And there is a growing sense among security experts that hackers have gained the upper hand. Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it.
what is Zero Day Attack
---Zero Day Attack<---
---------->can be harmful to specific computer long after a patch has been created and the vulnerability has been closed ,because many computer owners do not regularly update their software with patches made available by the software makers.But first because the typical zero day attack is unknown unit a large number of computer have been infected the option on anti-virus software to block currently unknown viruses and worms. A zero day attack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.
Monday, January 4, 2010
What WOULD YOU DO?
What would you do?
1.
---->where you begin and what steps would you take to fix the problem?
1.You can confirm the customers.
2.you can find the making headlines for the manufacturing company.
3.Can make it harder to criminal maybe the criminal find easily targets
4.after you can fix the security problem of the company target.
5.make a conclusion fix problem.
---->
2.
---->I would advice to her for continue to develop the administrative system,for help to other people through him.We can destroy all the evidence that you get.It might be cause of the any kind of trouble.
1.
---->where you begin and what steps would you take to fix the problem?
1.You can confirm the customers.
2.you can find the making headlines for the manufacturing company.
3.Can make it harder to criminal maybe the criminal find easily targets
4.after you can fix the security problem of the company target.
5.make a conclusion fix problem.
---->
2.
---->I would advice to her for continue to develop the administrative system,for help to other people through him.We can destroy all the evidence that you get.It might be cause of the any kind of trouble.
Subscribe to:
Posts (Atom)