Wednesday, May 13, 2009
Intellectual property (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
Thursday, April 30, 2009
Wednesday, April 29, 2009
Someone who carried out some action, often a bad thing like a crime. A perpetrator is the person
who commits the crime; it would be the opposite of a victim.
Sunday, April 26, 2009
The basic definition of cyberterrorism
Cyberterrorism is the leveraging of a target's computers and information , particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
Cyberterrorism is defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This definition was created by Kevin G. Coleman of the Technolytics Institute.[1]
...subsumed over time to encompass such things as simply defacing a web site or server, or attacking non-critical systems, resulting in the term becoming less useful...
There are some that say cyberterrorism does not exist and is really a matter of hacking or information warfare. They disagree with labeling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.
The National Conference of State Legislatures (NCSL), a bipartisan organization of legislators and their staff created to help policymakers of all 50 states address vital issues such as those affecting the economy or homeland security by providing them with a forum for exchanging ideas, sharing research and obtaining technical assistance [1] defines cyberterrorism as follows:
the use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.[2] Demitri Jesus Olmo.(FROM:wikipedia the free encyclopedia)
Wednesday, April 15, 2009
yes:Because if they are not professional how can we get a better job in the future.In our country today they give priority to those people that had finish a degree courses or degree holder so that you should know on how to manage to the job that to be assigning of.and also in our country we need also a skilled workers that willing to be assigned in any place of our country.I.T. professional has very dedicated to his job because there are rules that to be followed.if you had any eligibility its not hard to find a good job.
Tuesday, April 14, 2009
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other computer work
3. Thou shalt not snoop around on other people's file
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use copy software for which you have not paid
7. Thou shalt not use other people computer resources without authorization
8. Thou shalt not appropriate other people intellectual output
9. Thou shalt not think about a social consequences of the program you write
10.Thou shalt not use a a computer in ways that show consideration and respect