In the chapter we learn about cyberlaw. Cyberspace is being governed by a system of law and regulation called Cyberlaw. There is no one exhaustive definition of the term “Cyberlaw”. Simply speaking, Cyberlaw is a generic term which refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects or issues concerning any activity of netizens and others, in Cyberspace comes within the ambit of Cyberlaw. The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce.
Cyberlaw is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Initially it may seem that Cyberlaws is a very technical field and that it does not have any bearing to most activities in Cyberspace. But the actual truth is that nothing could be further than the truth. Whether we realize it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives
Monday, October 26, 2009
Tuesday, October 20, 2009
Lec 9 : Legal and Ethical Issues in Computer Security
In this chapter we study controls applicable to computer security the legal system and ethics. The legal system has adapted quite well to computer technology by reusing some old forms of legal protection and creating laws where no adequate ones existed. Still, the courts are not a perfect form of protection for computer resources. This is, we have to wait for a transgression to occur and then adjudicate t, rather than try to prevent it n the first place. Second, fixing a problem through the courts can be time consuming and expensive, the latter characteristic prevents all but the wealthy form addressing most security issues.
On the other hand, ethics has not bad to change, because ethics is more situational and personal than the law. And although technically this issue is just an aspect of confidentiality, practically it has log history in both law and ethics. This chapter too discuss is round out study of protection for computing system by understanding the context in which security is assessed and applied. Not always are conflict resolved pleasantly. Some people will think that they have been treated unfairly, and some people do indeed act unfairly.
Law and computer security are related in several ways. First, international, federal,state,and city laws can affect privacy and secrecy. These statues often apply ti the rights of individuals to keep personal mattes private. Second, laws regulate the use, development and ownership of data and programs. Patents, copyrights and trade secrets are legal devices to protect the rights of developers and owners of programs and data. Similarly, one aspect of computer security id controlling access to programs and data that access control is support by the mechanisms.
On the other hand, ethics has not bad to change, because ethics is more situational and personal than the law. And although technically this issue is just an aspect of confidentiality, practically it has log history in both law and ethics. This chapter too discuss is round out study of protection for computing system by understanding the context in which security is assessed and applied. Not always are conflict resolved pleasantly. Some people will think that they have been treated unfairly, and some people do indeed act unfairly.
Law and computer security are related in several ways. First, international, federal,state,and city laws can affect privacy and secrecy. These statues often apply ti the rights of individuals to keep personal mattes private. Second, laws regulate the use, development and ownership of data and programs. Patents, copyrights and trade secrets are legal devices to protect the rights of developers and owners of programs and data. Similarly, one aspect of computer security id controlling access to programs and data that access control is support by the mechanisms.
Thursday, October 15, 2009
Lec 8: Wireless Security
The chapter 8 we learn about the wireless security.Wireless network specifications ware originally defined in IEEE's 802.11 standard.There are now a series of 802.11 standard, and various implementations of wireless network now occupy several more 802 standard. The original 802.11 standard contained several security measures, including
- Disable the services set identifier (SSID) broadcast
- MAC addressing filtering
- Wired Equivalent Privacy (WEP) authentication
- WEP data encryption
Security in 802.11 was found to be seriously flawed in several areas 802.11 was developed to correct the shortcomings of security in 802.11. The WiFi also improved security for wireless networks with WiFi protected Access (WPA, WPA2) for home network use, called personal, and for business network use, called Enterprise. WPA uses an acceptable encryption algorithm that is strong and easier on the devices performing the encryption. WPA2 uses a significantly stronger algorithm that is considered uncrackable, but the performence of devices may suffer with the heavy work load.
- Disable the services set identifier (SSID) broadcast
- MAC addressing filtering
- Wired Equivalent Privacy (WEP) authentication
- WEP data encryption
Security in 802.11 was found to be seriously flawed in several areas 802.11 was developed to correct the shortcomings of security in 802.11. The WiFi also improved security for wireless networks with WiFi protected Access (WPA, WPA2) for home network use, called personal, and for business network use, called Enterprise. WPA uses an acceptable encryption algorithm that is strong and easier on the devices performing the encryption. WPA2 uses a significantly stronger algorithm that is considered uncrackable, but the performence of devices may suffer with the heavy work load.
Thursday, October 1, 2009
Lab 7 : Security in Application
In lab 7 we learn about security in application. In the lab 7 mostly we learn about FTP. File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet.
As a user,can use FTP with a simple command line interface (for example, from the Windows MS-DOS Prompt window) or with a commercial program that offers a graphical user interface. Your Web browser can also make FTP requests to download programs you select from a Web page. Using FTP, you can also update (delete, rename, move, and copy) files at a server. You need to logon to an FTP server. However, publicly available files are easily accessed using anonymous FTP.
Basic FTP support is usually provided as part of a suite of programs that come with TCP/IP. However, any FTP client program with a graphical user interface usually
As a user,can use FTP with a simple command line interface (for example, from the Windows MS-DOS Prompt window) or with a commercial program that offers a graphical user interface. Your Web browser can also make FTP requests to download programs you select from a Web page. Using FTP, you can also update (delete, rename, move, and copy) files at a server. You need to logon to an FTP server. However, publicly available files are easily accessed using anonymous FTP.
Basic FTP support is usually provided as part of a suite of programs that come with TCP/IP. However, any FTP client program with a graphical user interface usually
Tuesday, September 29, 2009
Lec 7 : Security Application
In the chapter 7 we learn about security application. In this chapter we must know about electronic mail security and what it is and how it works. In security provided in email is confidentiality , data origin authentication, message integrity, non-repudiation of origin and key management. We must to know how emails transported in when user used email. Mostly in this chapter about email security and threats. We must know how to secure the web. In HTTPS we must know access control.Nowadays, the
world is become expand especially in term of technology. For example, biometric technology and fingerprint recognition. At the same time, it also came with
advantage and disadvantage.
world is become expand especially in term of technology. For example, biometric technology and fingerprint recognition. At the same time, it also came with
advantage and disadvantage.
Wednesday, September 23, 2009
lab 6 Database security
In the Lab we learn about database security. In this lab we must to understand about the importance of security in database system and integrated potential implement of security in database.In this lab too, we should menage the record
Lec 6: Security In Network
In this chapter, we learn about the security in the network. Security is a very difficult topic.The sub topic important this chapter is Introduction to Network Who, cause security problem, Network security issues, Network security controls. Everyone has a different idea of what "security" is,and what levels of risk are acceptable. The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy. Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with security policies and practices.
It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved, and it's important to let them know why what's been done has been, the sorts of risks that are deemed unacceptable, and what has been done to minimize the organization's exposure to them.
It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved, and it's important to let them know why what's been done has been, the sorts of risks that are deemed unacceptable, and what has been done to minimize the organization's exposure to them.
Subscribe to:
Posts (Atom)