Wednesday, January 27, 2010

♫ LasT quiZ in midTeRm ♫

Privacy

Is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security— one in which trade-offs between the interests of one group and another can become particularly clear.


Privacy Protection and the Law

Is the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can track the web sites someone has visited. Another concern is whether web sites which are visited collect, store, and possibly share personally identifiable information about users.

The relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

While currently there is no national law to protect the privacy of the information you share online, federal law and state law do offer some protection to various kinds of personal information collected about you. At the national level, Congress has enacted laws as it perceived the need to arise. Therefore, you will see from the list below that you have privacy rights in specific kinds of information—information maintained about you in the health care system, your education records, the record of your video rentals, to name a few.

Wednesday, January 6, 2010

♫my midTeRm quiZ♫

4. Your friend just told you that he is developing a worm to attack the administrative systems at your collage. The worm is "harmless" and will simply cause a message - "Let's party!" - to be displayed on all workstations on Friday afternoon at 3 p.m. by 4 p.m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?

answer:

The first thing I can do is to get his attention and I will explain what happens to the administrative systems if he continue his plan. Second is to stop my friend to continue his plan so that it can't destroy the administrative systems. Lastly to thank my friend because, he told me about his plan.

--------------------------------------------------------------------

1. You are the CEO of a three-year-old softare manufacturer that has several products and annual revenues in excess of 500 mollion dollars You've just recieved a recommendation from the manager of software development to hire three notorious crackers to probe your software products in an attempt to identify any vulnerabilities. The reasoning is that if anyone can find a vulnerability in your software, they can. This will give your firm a head start on developing parches to fix the problems before anyone can exploit them. You're not sure, and feel uneasy about hiring people with criminal records and connections to unsavory members of the hacker/cracker community. What would you do?

answer:


I can hire the best and popular hacker/cracker that there is no criminal records to test my product and I strongly disagree that hacker/cracker that has criminal records can test my product because, i have no trust to them that test my products...


!!THATS ALL!!
THANK YOU FOR THE QUESTIONS MA'AM