2.8 NEED FOR CYBER LAW
In today`s highly digitalized world, almost everyone is effected
by cyber law.
Let us take a few example:
-almost all companies extensively depend upon their computer
networks and keep their valuable data in electronic form.
-government forms including income text returns, company law
forms etc filled in electronic form.
-most people are using email, cell phones and SMS messages
for communication.
Examples of Cyber abuse on the user
-sending a computer virus via e-mail
-harassment through e-mail
-hacking into your school`s database to change your examination
result.
Why we need cyberlaw
1.Criminal activities can be brought to justic.
2. Customer is made to feel secure because bank protects their money.
3.Cyber Laws are made to force people to be good.
4.to give protection againts the misue of computer and computer criminal activities
blog ini dimiliki oleh Mohamad Masrinnizam.alaaaa bosan ar ckp cmnie..haaa korg follow la ak erk... p blog ak nie sderhana jeee.... meh ar sumee..nk tau lbey lanjt g at blog ak g sa2...haaa...
Selasa, 26 April 2011
Selasa, 19 April 2011
PROCESS OF FILTERING.
a. keyword blocking. The method uses a list of banned word or
objects terns such as xxx,sex and nude. As the
page is downloading,the filter searches for any these word.
If found, it will blocked the page completely, stop
downloading page, block the banned words and even shut
down the browser.
b.site blocking. This method use software to list the website
that will be blocked by using software. The software also prevent
users from being access the website on list.
c.web rating system. Website are rating in terms of nudity, sex,
violence and language. The website rates can be done by setting
the browser to only accept pages with certain level of rating.
objects terns such as xxx,sex and nude. As the
page is downloading,the filter searches for any these word.
If found, it will blocked the page completely, stop
downloading page, block the banned words and even shut
down the browser.
b.site blocking. This method use software to list the website
that will be blocked by using software. The software also prevent
users from being access the website on list.
c.web rating system. Website are rating in terms of nudity, sex,
violence and language. The website rates can be done by setting
the browser to only accept pages with certain level of rating.
Ahad, 3 April 2011
2.6-PORNOGRAPHY and SLANDER.
P O R N O G R A P H Y | Pornography is any form of media material(like books, video or photos)that show erotic behavior and intended to cause sexual excitement. Effects of pornography: -can lead to criminal such as exploitation of woman, -can lead to sexual addiction. -can develop moral values towards others people. -can erode good religious, culture, behaviours and beliefs. |
S L A N D E R | Slander is a false spoken statement about someone, intended to damage his or her reputation. The effects of slander on society are; -can develop society that disregards on honesty and truth. -can lead to bad habits of spreading rumors and untruth. -can cause people to have negative attitudes towards another person |
2.5 AUTHENTICATION technologies.
Authentication is a process where user verifies their identity.
Authentication deals with the problem of determining whether
a user should be allowed access to a particular system. Four
commonly authentication methods:
a. User identification (something you know - have to remember).
a. User identification (something you know - have to remember).
User identification is a unique combination of
character (letter, number or symbol) that identify specific user.
character (letter, number or symbol) that identify specific user.
Examples of user identification are pin number and password.
b. Possessed object (something you have - an object). A possessed
b. Possessed object (something you have - an object). A possessed
object is any item that you must carry to gain access to computer
or computer facility. Examples of possessed objects are ATM card,
credit card, key,security token and smart card. The card you use in
an automated teller machine (ATM) is a possessed object that allows
access to your bank account.
c. Biometric device (something you are - part of user's body) is a devices
c. Biometric device (something you are - part of user's body) is a devices
that translates personal characteristic into digital code that is
compared with the digital code stored in the database. E.g. of biometric
Privacy
2.4 Ways for making personal
data more private
1. Purchase goods with cash, rather than
credit card.
2. Install personal firewall.
3. Clear your history file when you are
finished browsing.
4. Have unlisted telephone number.
5. Fill in only necessary information on
warranty and registration form.
1. Purchase goods with cash, rather than
credit card.
2. Install personal firewall.
3. Clear your history file when you are
finished browsing.
4. Have unlisted telephone number.
5. Fill in only necessary information on
warranty and registration form.
Langgan:
Catatan (Atom)