I made this widget at MyFlashFetish.com.

Selasa, 26 April 2011

COMPUTER CRIME.

2.8 NEED FOR CYBER LAW
        In today`s highly digitalized world, almost everyone is effected
        by cyber law.
        Let us take a few example:
        -almost all companies extensively depend upon their computer
          networks and keep their valuable data in electronic form.  
        -government forms including income text returns, company law
          forms etc filled in electronic form.  
        -most people are using email, cell phones and SMS messages
         for communication.

Examples of Cyber abuse on the user
         -sending a computer virus via e-mail
         -harassment through e-mail
         -hacking into your school`s database to change your examination
           result.

Why we need cyberlaw
         1.Criminal activities can be brought to justic.
         2. Customer is made to feel secure because bank protects their money.
         3.Cyber Laws are made to force people to be good.
         4.to give protection againts the misue of computer and computer criminal activities

Selasa, 19 April 2011

PROCESS OF FILTERING.

a. keyword blocking. The method uses a list of banned word or  
    objects terns such as xxx,sex and nude. As the             
    page is downloading,the filter searches for any these word.
    If found, it will blocked the page completely, stop 
    downloading page, block the banned words and even shut
    down the browser.


b.site blocking. This method use software to list the website 
    that will be blocked by using software. The software also prevent 
    users from being access the website on list.


c.web rating system. Website are rating in terms of nudity, sex, 
    violence and language. The website rates can be done by setting 
    the browser to only accept pages with certain level of rating.

Ahad, 3 April 2011

2.6-PORNOGRAPHY and SLANDER.



  
P
O
R
N
O
G
R
A
P
H
Y
Pornography is any form of media material(like books, video or photos)that show erotic  behavior and intended to cause sexual excitement.

 Effects of pornography:
   -can lead to criminal such as exploitation of woman,
   -can lead to sexual addiction.
   -can develop moral values towards others people.
   -can erode good religious, culture, behaviours and beliefs.  
S
L
A
N
D
E
R
Slander is a false spoken statement about someone, intended to damage his or her reputation.

The effects  of slander on society are;
   -can develop society that disregards on honesty and truth.
   -can lead to bad habits of spreading rumors and untruth.
   -can cause people to have negative attitudes towards another person

2.5 AUTHENTICATION technologies.

Authentication is a process where user verifies their identity. 
 Authentication deals with the problem of determining whether
 a user should be allowed access to a particular system. Four 
commonly authentication methods:

a. User identification (something you know - have to remember). 
User identification is a unique combination of
character (letter, number or symbol) that identify specific user.
 Examples of user identification are pin number and password.


b. Possessed object (something you have - an object). A possessed
 object is any item that you must carry to gain access to computer 
or computer facility. Examples of possessed objects are ATM card, 
credit card, key,security token and smart card. The card you use in
 an automated teller machine (ATM) is a possessed object that allows 
access to your bank account. 
                              




c. Biometric device (something you are - part of user's body) is a devices
 that translates personal characteristic into digital code that is
 compared with the digital code stored in the database. E.g. of biometric
 devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 


hand geometry reader





Privacy

2.4 Ways for making personal
       data more private

         1. Purchase goods with cash, rather than       
          credit card.
       2. Install personal firewall.
       3. Clear your history file when you are              
           finished browsing.
       4. Have unlisted telephone number.
       5. Fill in only necessary information on   
           warranty and registration form.