Monday, December 13, 2010
Monday, December 6, 2010
IT104earlyjeansoria
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
IT104earlyjeansoria
1.Why has there been a dramatic increase in the number of computer related security incidents in recent years?
ans:
for me,,. many incidents happening in the computer security because of the people using a any code.. and many people in the past years that very expert in using a any code of the computer..
2.What are some characteristic of common computer criminals including their objectives.
ans:
Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.
1. Netcrime refers, more precisely, to criminal exploitation of the Internet.
2.Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare.
3.The international legal system is attempting to hold actors accountable for their actions, with In the infancy of the hacker subculture and the computer underground,[3] criminal convictions were rare because there was an informal code of ethics that was followed by white hat hackers.[4] Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[5] White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around.[6] They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. the International Criminal Court among the few addressing this threat.
3.What actions must be taken in response to a security incidents.
ans:
The types of security incidents likely to affect patient confidentiality are variable. Data security incidents may take many forms including the following:
· Theft of equipment holding confidential information – PCs, dicta-phones, case-notes, etc.
· Unauthorised access to a building or areas containing unsecured confidential information.
· Access to patient records by an authorised user who has no work requirement to access the records.
· Authorised access which is misused (staff).
· Electronic access (hacking) and viruses.
· Misuse of equipment such as faxes, text messages on mobiles and e-mails.
· Inadequate disposal of confidential material (paper, PC hard drive, disks/tapes, etc).
· Car theft / break-ins to on-call staff carrying patient records.
· Unauthorised access to records away from premises (e.g. laptops and notes when travelling between clinics to home-visits etc).
· Complaint by a patient, or a member of the public, that confidentiality has been breached.
· Careless talk.
Subscribe to:
Posts (Atom)