Monday, January 25, 2010

"Privacy Protection and Law"



"LAW"

-.".-Privacy law -->is the area of law concerned with the protection and preservation of the privacy rights of individuals. Increasingly, governments and other public as well as private organizations collect vast amounts of personal information about individuals for a variety of purposes. The law of privacy regulates the type of information which may be collected and how this information may be used,The scope of applicability of privacy laws is called expectation of privacy.

-.".-Privacy laws can be broadly classified into:

General privacy laws--> have an overall bearing on the personal information of individuals and affect the policies that govern many different areas of information.

Specific privacy laws--> These laws are designed to regulate specific types of information.

Privacy Protection and law?


"PRIVACY PROTECTION"

-.".- To the implementation of leading-edge privacy protection technologies, PCIS can assist your organization in ensuring that your information systems are protected and your privacy protection management practices are in compliance with current privacy laws.
Privacy protection is not just about the law—it’s also about good business. If a company is publicly labeled as a privacy offender, it could prove devastating for the organization. Client distrust and poor publicity can be more damaging than legal action. Identity theft has become a growing liability for businesses and for most, the potential cost of non-compliance is simply too high.
PCIS is recognized as a leader on privacy issues and combating identity theft. Working in concert with Vancouver law firm Clark, Wilson, PCIS clients are assured they have access to the best legal and technical advice available on privacy protection management and corporate information systems security.




What is Computer Privacy?



"What is Computer Privacy?"





--> In this generation we use computers and the Internet everywhere we do our banking,read books find different kinds of information, but on the other side Internet id full of potential risk to our privacy and security. So while these are lots of things that we have gained from the Computer revolution there is a price we have to pay and the price is our "Computer Privacy",Of course there is no simple solution for this problem.

There are different tools available to help us maintain our privacy
"Anonymous Surfing Tools, Encryption Software, Clear History Software."
there are the tools on how to maintain our Privacy, when your "Personal Computer" is equipped with Privacy software it has the greatest chance of surviving privacy or security attacks.

Monday, January 11, 2010

"Computer Criminals"


"Computer Criminals"


-->Computer crime includes traditional criminal acts committed with a computer, as well as new offenses that lack any parallels with non-computer crimes. The diversity of offenses renders any narrow definition unworkable. The U.S. Department of Justice (DOJ) broadly defines computer crimes as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution."
---> Broad term applying to any type of crime committed via a computer, including unauthorized access to files. Most computer crime is committed by disgruntled former employees or subcontractors.
Examples include the releasing of viruses, hacking, and computer fraud. Many countries, including the USA and the UK, have specialized law enforcement units to supply the technical knowledge needed to investigate computer crime.

Who's behind criminal bot networks?

They have infected perhaps 100 million computers with viruses, turning the PCs around the world into an army of willing criminal assistants known as “bots.” They are using those PCs to send out billions of spam e-mails and make millions of dollars by attacking Web sites and extorting their owners. They have even attacked the core computers that keep the Internet running smoothly.




What is "Zero Day Attack?"



"Zero Day Attack"

"Takes place before the security community or software developer knows about a vulnerabilities or has been able to repair it...."


-->A Zero day attack also known as "a zero hour attack",takes advantage of computer vulnerabilities that do not currently have a solution.Typically a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch another piece of software meant to fix the original issue.
If the vulnerability is not particularly dangerous,software producers may choose to hold off until multiple updates are collected and release them together as a package,Still this approach can potentially expose users to a "zero day attack".

Monday, January 4, 2010

what would you do?




"Step's in how to fix a problem"

--> 1. Make a little conversation in other applicant about the issues.
--> 2. Find the reason why that people making negative headlines about the manufacturing company
.
--> 3. Make a conclusion in the problem.
--> 4. and after that you can fix the security problem.

--> when you find the real reason,as a hired IT security consultant you should be alert and observance of the people who belong to your group.and make sure that you and your boss know what is the detail about the security problem so that the black sheep of your company don't have any idea..
When you found who is the black sheep of your company you must fired that person so that the problem will be okey..










-->
I will talk my friend not to do that co'z it is bad and it is not important....if the evidence will not erase all the owner will fail you a case that makes her bad....it's not right to make a joke to the big company or any people,sending virus will make people angry..!!!! so don't do that......