Monday, January 25, 2010

what is privacy protection?

This information has to be made publicly available to everyone via the public WHOIS database as required by ICANN, the international governing body for domain names. Everyday, this valuable source of accurate contact information is targeted and harvested by spammers and telemarketers resulting in unwanted and unsolicited contact. Also since your contact information is public, you are at risk for identity theft and fraud and of being contacted by harassers and stalkers.

Privacy Protection ensures that your private information is not published by replacing all your publicly visible contact details with alternate contact information.

What is computer privacy in the law?

Simply stated, courts in the United States tend to favor the employer in workplace-surveillance cases. For that reason, employees should always use good judgment when logging onto the Internet and sending e-mails. Choose your words carefully; you never know who might read your correspondence.

Under the Electronic Communications Privacy Act (ECPA), electronic communications are divided into two groups:

  • Stored communication
  • Communication in transit

Under­ the law, electronic communication in transit has almost the same level of protection as voice communication, meaning that intercepting it is prohibited. Accessing stored electronic communication, such as e-mail sitting on a server waiting to be sent, is not illegal. The courts have ruled that since the e-mail is not physically traveling anywhere -- is not "in transit" -- it does not have the same level of protection.

What is privacy?

Privacy (from Latin privatus 'separated from the rest, deprived of sth, esp. office, participation in the government', from privo 'to deprive') is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.

SOURCE:www.wikipedia.com

Monday, January 18, 2010

who are the computer criminals and their object?

are mean and sinister type.But many more wear business suits,have university degrees,and appear to be pillars of their communities.

no single profile captures the characteristics of a typical computer criminal, and many who fit the profile are not criminals at all.

WHAT WOULD I SAY OR DO?

1) I will talk to my manager and co-worker that was an accident.Then I will check my IT SECURITY if it is correct and new,after that I will change my security system.

2) If my friends expert to that crimes in the COMPUTER COMPANY,I will tell the administration for that big problem.So that it will cure the virus,then I will do my best as a worker.

Zero-Day-Attack

= takes place before the security community or software developer knows about a vulnerability or has been able to repair it.