Wednesday, May 13, 2009

Intellectual property right:

Intellectual property rights are a bundle of exclusive rights over creations of the mind, both
artistic and commercial. The former is covered by copyright laws, which protect creative works, such as books, movies, music, paintings, photographs, and software, and give the copyright holder exclusive right to control reproduction or adaptation of such works for a certain period of time.[3]
assignments:

Intellectual property
(IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

Thursday, April 30, 2009

(assignments)
what is cyber criminals?
a person committed crime using a computer and the internet to steal a person or sell contraband or stalk victim.

Wednesday, April 29, 2009

What is Perpetrator:
Someone who carried out some action, often a bad thing like a crime. A perpetrator is the person
who commits the crime; it would be the opposite of a victim.

Think of it this way:
A victim is one who receives the effects of a crime, but a perpetrator is one who causes those effects. source:Wiki answers.com

Sunday, April 26, 2009

The basic definition of cyberterrorism

Cyberterrorism is the leveraging of a target's computers and information , particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.

Cyberterrorism is defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This definition was created by Kevin G. Coleman of the Technolytics Institute.[1]

...subsumed over time to encompass such things as simply defacing a web site or server, or attacking non-critical systems, resulting in the term becoming less useful...

There are some that say cyberterrorism does not exist and is really a matter of hacking or information warfare. They disagree with labeling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.

The National Conference of State Legislatures (NCSL), a bipartisan organization of legislators and their staff created to help policymakers of all 50 states address vital issues such as those affecting the economy or homeland security by providing them with a forum for exchanging ideas, sharing research and obtaining technical assistance [1] defines cyberterrorism as follows:

the use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.[2] Demitri Jesus Olmo.(FROM:wikipedia the free encyclopedia)

Wednesday, April 15, 2009

ARE INFORMATION TECHNOLOGY WORKERS PROFESSIONAL?



yes:Because if they are not professional how can we get a better job in the future.In our country today they give priority to those people that had finish a degree courses or degree holder so that you should know on how to manage to the job that to be assigning of.and also in our country we need also a skilled workers that willing to be assigned in any place of our country.I.T. professional has very dedicated to his job because there are rules that to be followed.if you had any eligibility its not hard to find a good job.

Tuesday, April 14, 2009

THE TEN COMMANDMENTS FOR COMPUTER ETHICS
BY:COMPUTER ETHIC SOCIETY

1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other computer work
3. Thou shalt not snoop around on other people's file
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use copy software for which you have not paid
7. Thou shalt not use other people computer resources without authorization
8. Thou shalt not appropriate other people intellectual output
9. Thou shalt not think about a social consequences of the program you write
10.Thou shalt not use a a computer in ways that show consideration and respect