Tuesday, October 20, 2009

Lec 9 : Legal and Ethical Issues in Computer Security

In this chapter we study controls applicable to computer security the legal system and ethics. The legal system has adapted quite well to computer technology by reusing some old forms of legal protection and creating laws where no adequate ones existed. Still, the courts are not a perfect form of protection for computer resources. This is, we have to wait for a transgression to occur and then adjudicate t, rather than try to prevent it n the first place. Second, fixing a problem through the courts can be time consuming and expensive, the latter characteristic prevents all but the wealthy form addressing most security issues.

On the other hand, ethics has not bad to change, because ethics is more situational and personal than the law. And although technically this issue is just an aspect of confidentiality, practically it has log history in both law and ethics. This chapter too discuss is round out study of protection for computing system by understanding the context in which security is assessed and applied. Not always are conflict resolved pleasantly. Some people will think that they have been treated unfairly, and some people do indeed act unfairly.

Law and computer security are related in several ways. First, international, federal,state,and city laws can affect privacy and secrecy. These statues often apply ti the rights of individuals to keep personal mattes private. Second, laws regulate the use, development and ownership of data and programs. Patents, copyrights and trade secrets are legal devices to protect the rights of developers and owners of programs and data. Similarly, one aspect of computer security id controlling access to programs and data that access control is support by the mechanisms.

No comments:

Post a Comment