2011年3月20日星期日

Chapter 10 Privacy and Security

Chapter 10  Privacy and Security

  Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.

It’s three types of:
1.         Accuracy is about responsibility of those who collect data.
2.         Property is any physical or intangible entity that is owned by a person or jointly by a group of people.
3.         Access is responsibility of those who control data and use of data

Security


Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.

1.         Viruses infect computers or other electronic devices and are passed on by user activity, for example by opening an email attachment

2.         Worms self-propagate using an internet connection to access vulnerabilities on other computers and to install copies of themselves.

3.         Trojans are malware masquerading as something the user may want to download or install, that may then perform hidden or unexpected actions, such as allowing external access to the computer.

How to precaution the computer crime?

v  Get Safe Online
The Government–industry partnership education initiative Get Safe Online is the first national internet-based computer security awareness campaign for the general public and small businesses.

v  Technological solutions
A range of technologies is available to home users and organizations to secure their computers
Other Hazards



1.         Natural hazards include fires, floods, winds, hurricanes, etc., keep data is safe locations in case of fire or storm damage

2.         Civil strife – wars, riots, etc. are real risks

3.         Technological failures – voltage surges or spikes (key term); hard disk crashes possibly occur when the hard disk is bumped

4.         Human errors – data entry are commonplace mistakes; programming, faulty design mistakes; sloppy procedures

In Malaysia

  In Malaysia, the Parliament amended the provisions of punishments for certain white-collar offences on 17 September 1993. Offences of criminal breach of trust under sections 406 to 409 and cheating under section 420 of the Penal Code now carry a mandatory minimum term of imprisonment (one year) together with mandatory whipping, and the courts have the discretion to further impose a fine.

The Royal Malaysia Police, through its Commercial Crime Investigation Department (CCID), is the main agency that investigates white-collar crime cases in Malaysia. Over the years, the police have successfully investigated, arrested and prosecuted most of the criminals involved in the cases reported to them.

Conclusion
The fundamental issue in most computer crime is the criminals' lack of respect for the property or privacy of other people. I hope that society will recognize the seriousness of computer crime and demand more severe punishment for such criminals.

没有评论:

发表评论