- Most ethical and legal issues in computer system are in the area of individual’s right to privacy versus the greater good of a larger entity i.e. a company or a society. For example, tracking how employees use computers, crowd surveillance, managing customer profiles, tracking a person’s travel with passport and so on. A key concept in resolving this issues is to find out, what is a person’s expectation of privacy. Classically, the ethical issues in security system are classified into following 4 categories:
- Privacy: This deals with the right of an individual to control personal information. It is the protection of personal or sensitive information. Privacy is subjective. Different people have different ideas of what privacy is and how much privacy they will trade for safety or convenience.
- Accuracy: This talks about the responsibility for the authenticity, fidelity an accuracy of the information.
- Property: This determines who the owner of the information is and who controls access.
- Accessibility: This deals with the issue of the type of information, an organization has the right to collect. And in that situation, it also expects to know the measures which will safeguard against any unforeseen eventualities.
- When dealing with legal issues, we need to remember that there is hierarchy of regulatory bodies that govern the legality of information security. The hierarchy can be roughly described as follows:
- International: e.g. International Cybercrime Treaty
- Federal: e.g. FERPA, GLB, HIPAA
- State: e.g. UCITA, SB 1386 etc.
- Organization: e.g. Computer Use policy
What are ethical and legal issues in computer security system ?
feel free to contact us [email protected]
-
What are the different types of criminal attacks?
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, tybscit network security types of criminal attacks, types of criminal attacks in network security, 0
Fraud:- Modern fraud attacks concentrate on manipulating some aspects of electronic currency, credit cards, electronic stock certificates, checks, letters...
-
IDEA Algorithm
Web Master, , Network Security, atul kahate notes network security, idea algorithm, idea algorithm in network security, mumbai university tybscit notes, tybscit network security notes, 0
IDEA – International Data Encryption Algorithm. It is patent protected to prevent fraud and privacy.It was meant to be a...
-
Explain modified version of Caesar Cipher
Kaushik Kini, , Network Security, atul kahate notes network security, modified version of Caesar Cipher, modified version of Caesar Cipher in network security, network security notes, tybscit network security modified version of Caesar Cipher, 0
We all know in Caesar cipher we replace each alphabet with other alphabet which is 3 positions down the...
-
What are the typical phases of operation of a virus?
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, phases of a virus, phases of a virus in network security, tybscit network security phases of a virus, 0
The first stage is called Pre-trigger stage or the dormant stage. In this stage viruses lie dormant, and does...
-
RC4 Algorithm in Network Security tybscit Semester 5
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, bscit notes for mumbai university, network security notes, network security notes for tybscit semester 5, network security practicals, RC4 Algorithm, tybscit semester 5 practicals, 0
RC4was designed by Ron Rivest. It is based on stream cipher i.e. the encryption & decryption happens byte by...
-
BlowFish Algorithm
Chirag Deora, , Network Security, atul kahate notes network security, blowfish algorithm, bscit notes, bscit notes for mumbai university, download advanced java practical tybscit of mumbai university, network security notes, network security notes for tybscit semester 5, network security practicals, tybscit semester 5 practicals, 0
BlowFish was developed by Bruce Schneier. Blowfish is a symmetric block cipher.It encrypts 64 bit block with variable-length key,...
-
Explain Asymmetric key cryptography
Kaushik Kini, , Network Security, Asymmetric key cryptography, Asymmetric key cryptography in network security, atul kahate notes network security, network security notes, tybscit network security, tybscit network security Asymmetric key cryptography, 0
In Asymmetric key cryptography, each person has two keys i.e. Public key& Private key. The public key is known...
-
Give the classification of Viruses
Kaushik Kini, , Network Security, atul kahate notes network security, different types of viruses, network security notes, notes for tybscit, viruses in network security, 0
Parasitic Virus:- his is the most common form of virus. Such a virus attaches itself to executable files and...
Green Computing Book
C++ Interview Questions
Categories
- Advance Java (15)
- Advance Sql (8)
- ASP.NET with C# (16)
- Computer Graphics (3)
- Cyber Law (22)
- Digital Electronics 16-17 (2)
- Fybscit Semester 1 (1)
- FYBSCIT Semester 1 Question Bank (2)
- Fybscit Semester 2 (1)
- Imperative Programming (6)
- Linux Administration (3)
- Unit 1 (3)
- Network Security (33)
- News (40)
- Posts (1)
- Professional Communication Skills (2)
- Project (1)
- Project Management (1)
- Software Testing (1)
- Tybscit Question Papers (11)
- Semester V (7)
- Semester VI (4)
Recent Posts
- TYBSCIT Semester 5 Question Paper and Solution November 2017 (C75:25)
- TYBSCIT Semester 5 Exam Dates of October 2017 CBSGS 75:25 Postponed
- Tybscit Semester 5 Question Paper & Solutions November 2016 (75:25)
- FYBSCIT Semester 1 Question Paper & Solutions – October 2016 (75:25)
- FYBSCIT Semester 2 Question Paper & Solutions – March 2017
Recent Comments
- Web Master on JSplitPane Example in Advance java – Tybscit Semester 5
- priya on JSplitPane Example in Advance java – Tybscit Semester 5
- Web Master on TYBSCIT Semester V KT Results Announced April 2016
- Web Master on TYBSCIT Semester V KT Results Announced April 2016
- Web Master on Question Bank for Operating System fybscit semester 1