Wednesday, January 27, 2010

Last activity for Midterm

Privacy,Protection Law

PRIVACY
Computer Privacy
When someone uses Windows Remote Assistance to connect to your computer, that person can see your desktop, any open documents, and any visible private information. In addition, if you allow your helper to control your computer with his or her own mouse and keyboard, that person can do things such as delete files or change settings. You can also choose to allow the person connecting to your computer to respond to User Account Control prompts. Only allow people you trust to access or share control of your computer.

Warning

Before you allow someone to connect to your computer, close any open programs or documents that you don't want your helper to see. Watch what your helper is doing. If at any time you feel uncomfortable about what that person is seeing or doing on your computer, click Stop sharing or press Esc to end the session.

Internet Privacy

The right to privacy in Internet activity is a serious issue facing society. Some users of the 'net wish to shield their identities while participating in frank discussions of sensitive topics. Others fulfill fantasies and harmlessly role play under the cover of a false identity in chatrooms, MUDs or the IRC. But there are the eternal "bad apples," and on the Internet, they are the people who use anonymous servers as more than a way to avoid responsibility for controversial remarks. Cases of harassment and abuse have become increasingly frequent, aided by a cloak of anonymity. There are also problems with frauds and scam artists who elude law enforcement authorities through anonymous mailings and postings. Other users are concerned about the proliferation of information on the Internet. Databases of court records are now available for free over the World WidWeb.

PROTECTION LAW

Law is a system of rules, usually enforced through a set of institutions.[5] It shapes politics, economics and society in numerous ways and serves as a primary social mediator of relations between people. Contract law regulates everything from buying a bus ticket to trading on derivatives markets. Property law defines rights and obligations related to the transfer and title of personal (often referred to as chattel) and real property. Trust law applies to assets held for investment and financial security, while tort law allows claims for compensation if a person's rights or property are harmed. If the harm is criminalised in a statute, criminal law offers means by which the state can prosecute the perpetrator. Constitutional law provides a framework for the creation of law, the protection of human rights and the election of political representatives. Administrative law is used to review the decisions of government agencies, while international law governs affairs between sovereign nation states in activities ranging from trade to environmental regulation or military action. Writing in 350 BC, the Greek philosopher Aristotle declared, "The rule of law is better than the rule of any individual."








Wednesday, January 6, 2010

Midterm Quiz


Question: 4. Your friend just told you that he is developing a worm to attack the administrative systems at your college. The worm is "harmless" and will simply cause a message - "Let's party!" - to be displayed on all workstations on Friday afternoon at 3 p.m. By 4 p. m., the virus will erase itself and destroy all evidence of its presence. What would you say or do? Ans:
First thing i can do is to stop his plan. I will explain to him what are the consequences if he will continue his plan. If he won't listen to my advise it's better to report him to our proffesor.That is for his own good to his future not mine.


Question:
2. You have just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and its customers. You have been given 90 days and budget of 1 million dollars. Where would you begin, and what steps would you take to fix the problem?

Ans:
First step is to find how the hackers hack the company. Second, Fix the security problem so that it will not happen again. Third, locate the hackers where they are working for. Fourth, arrest those who are responsible of this case. And last one is to go for vacation and MISSION COMPLETION!.