answersLogoWhite

0

Computer Security Law

Computer security means protecting the confidentiality, integrity, and availability of information stored on, processed by, and transmitted by computers. In order to achieve this, various governments and organizations have established laws, regulations, and standards for securing computers and the data stored, processed, and transmitted by them. This category is for questions about existing and proposed laws and standards specifically related to computer security including the contents of the laws & regulations, who is legally responsible, who/what the laws/regulations/standards apply to, how the security is evaluated, and how it is documented.

310 Questions

Can you describe about computer ethics and law?

Although copyright does apply to computer software and related IP, the law consistently fails to keep up with technology. As a result, we rely on ethics to fill in the gray areas: this action may not be explicitly prohibited in the law, but it seems like it would hurt someone else, so I won't do it.

What are the 8 principles of data protection?

The 8 principles of data protection are as follows:

1. Processed fairly and lawfully.

2. Obtained for specified and lawful purposes.

3. Adequate, relevant and not excessive.

4. Accurate and up to date.

5. Not kept any longer than necessary.

6. Processed in accordance with the "data subject's" (the individuals) rights.

7. Securely kept.

8. Not transferred to any other country without adequate protection.

What are wireless deployment mistakes to avoid?

There are no mistakes list to determine which are mistakes. To make sure no mistakes are committed consult a professional.

Data Protection Act 1998 in relation to medication?

The Data Protection Act 1998 governs the handling of personal data in the UK, including health-related information such as medication records. It mandates that any data collected about an individual's medication must be processed fairly, stored securely, and used only for legitimate purposes. Patients have the right to access their medication records and request corrections if the data is inaccurate. Compliance with this Act is crucial for healthcare providers to ensure patient confidentiality and data integrity.

What essential protections must be in place to protect information systems from danger?

The essential (basic or foundation) protections to protect information systems must consist of a three tier approach: Technical, Physical and Administrative. Within these tiers are the core building blocks of managing a dynamically changing security posture. Before moving on, seriously consider, no protection can be more consistently effective without situational awareness, due diligence, and enforcement. Broken down succinctly you must ensure certain hardware and software are installed, implemented well and the latest security patches is kept updated: Network Router/Switch, Operating System (OS), Firewall, Anti-Virus, Spyware Protection and any security updates available for your other software. Remember these are basic protections. In addition, a great back up plan: External drives and/or High Capacity storage Media (the former is usually faster), and a real time backup application for both the data as well as the system itself. It will allow for recovery of not only your important data but you can also fully restore your information system in a shortened amount of time (as opposed to reloading the OS and each application). Finally, you need encryption; two types: 1. Data-at- Rest (stored on hard drives and/or other media) and 2. Data-in-Transit (Sending your data from one location to another and keeping it from prying and spying eyes). All of the above is the beginning of your "defense in depth" information systems protection program.

Technical security controls are devices, processes, protocols, and other measures used to protect the information system; examples include but not limited to; encryption, anti virus, firewalls, Spyware Protection, etc.

Physical security controls are physical ways and means you prevent access to the information systems; locked doors, fences, alarms, cameras etc.

Administrative controls are essentially the polices and procedures put in place to ensure your information system doesn't become vulnerable by following some basic rules and acceptable use policy (not to mention what information you authorize to give out and who can access your information system).

How can apply for special executive officer in Mumbai?

How can i apply for the Special Executive Officer in Mumbai?

what is the Eligibility Criteria for Being a Special Executive Office?

where should i contact for Special Executive Officer ? is there any Contact Number.

Please! Reply me ASAP. at

mail Id: manoj_shaan12@yahoo.co.in

Mobile : +91-9820045515.

What circumstances warrant information to be denied the Controlled Unclassified information designation?

  • To conceal law violations.
  • To prevent embarrassment to a person.
  • To prevent embarrassment to the organization.
  • To delay the release of information that does not require protection.

How do you get rid of slanderous blogs about you?

The best you could hope for is to sue under any available slander laws and have a court issue an order for the deleting/removal of the blog. If they award sufficient damages it may be enough motivation for the blog author to not repeat the slander. Note that you have to meet the legal requirements to prove slander before you can win such a case. Occasionally you may be lucky enough that the web service hosting the blog will take it down for you if you contact them and complain, but that's the exception.

Computer wiz hackers spammers how do you get a message out?

Most spammers utilize very illegal means to broadcast their messages. They usually use bot networks - groups of machines they have compromised and turned into "zombies" - to launch their massive email barrages. There are several reasons for doing this:

1) since spamming is illegal in many areas, they try to insulate themselves from being identified as the source of the spam

2) Even where spamming is not explicitly illegal, the crap they are hawking often is - either outright or because it is fraudulent. Consequently, it is valuable to them to make it hard to identify the source of the spam.

3) By using someone else's computer to send the spam, they insulate themselves from retribution from those they are spamming

4) They don't have to actually buy the hardware, they can just steal it (or at least the use of it) by hacking it and installing their software on it without the owner's permission. "Owning" a machine in this way is just a slang term meaning that they have control of it - they certainly don't own it from a legal standpoint.

The details of how they compromise other people's machines and set up bot networks will not be presented on this website - which has a policy of not aiding and abetting criminal activities.

Ia posture will be reviewed every 2 years?

This answer is per DIACAP (Defense Information Assurance Certifications and Accreditation Program - DODI 8510), as the defacto standard in the field of information assurance; historically the process was over a three year period. However, after due diligence and oversight, it was discovered that many IA Managers and supporting IT personnel were essentially waiting until the last 6 to 12 months (of the 3 year cycle) before full IA reviews were conducted. Currently, in the IT/IA community, the IA posture is considered a dynamically changing process;as changes in the enterprise occur the IA Posture is updated, reviewed and documented, providing a living and current IA life cycle. This process ensures effective management in preventing and/or mitigating the day to day risks and threats of an IT environment as they can occur and immediately record/document the change.

What is the UK law on surveillance?

It depends what you mean by surveillance. Anyone can mount security cameras on their property - provided it's not deliberately aimed into another person's home. You can record amy image from your own security cameras (but you cannot 'broadcast' images of people without their consent). You cannot use covert equipment in someone else's home without them being aware the equipment is installed. Some examples...

A... You fix a camera to your house, pointing down your drive, to monitor your car - Perfectly legal.

B... Your camera 'happens' to have a clear view of the bedroom in the house opposite - Illegal (invasion of privacy).

C... You 'hide' a camera inside a teddy bear - because you suspect your babysitter is abusig your child. Legal - so long as you don't post the footage on the 'net.

Explain clearly the function of the DAA instruction in an 8085A microprocessor system?

DAA (Decimal Adjust for Addition) is used following a normal ADD, when it is known that the input data represented BCD (Binary Coded Decimal). It compensates for the half byte carry that might occur because the BCD format is not the same as the binary format.

Differences between computer law and computer ethics?

Computer Law - is a set of recent legal enactments, currently in existence in several countries. while Computer Ethics more on covers for the actions that is done with the computer, whether it is ethically good or unethical.

Data misuse act?

Not too sure about any "data misuse act", but theComputer Misuse Actof1990

is an Act of theParliament of the United Kingdomwhich criminalizedunauthorizedaccess to computer materials,unauthorizedaccess with intent to commit or facilitate commission of further offences,andunauthorizedmodification of computer material. Ammendments to the act were intended to bring it into consistency with theEuropean Convention on Cyber Crime, which included some stipulations on how data stored on computers should be used.


TheData Protection Act 1998is aUnited KingdomAct of Parliamentwhich defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs theprotection of personal datain the UK.

What is a program managers relationship with the DAA?

PM (or SM) can report to the DAA.

It is also permissible for both the PM (or SM) and the CA to report to the DAA.

The DAA can not be assigned to report to the PM (or SM).

The PM (or SM) and DAA can not be the same person.

What 3 laws have had a significant effect on information security in the U S?

There are more than 3 laws with significant effect on information security, but three of them are:

  • Gramm-Leach-Bliley Act (GLB), also known as the Financial Services Modernization Act of 1999
    • This one requires financial institutions to develop a written information security plan that describes how the company is prepared for, and plans to continue to protect clients' nonpublic personal information. (The Safeguards Rule applies to information of any consumers past or present of the financial institution's products or services.)
  • Sarbanes-Oxley Act of 2002 (Pub.L. 107-204, 116 Stat. 745)
    • This one dictates requirements for information and information technology audits in publicly traded companies
  • Federal Information Security Management Act of 2002("FISMA", 44 U.S.C. § 3541)
    • This one assigns specific responsibilities to federal agencies, the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) in order to strengthen information system security. In particular, FISMA requires the head of each agency to implement policies and procedures to cost-effectively reduce information technology security risks to an acceptable level.

Is it illegal to put an MP3 on a website?

== == If you do not own the copyright to the music/song and do not have the express permission of the legal copyright holder, then yes, it is illegal. Especially if you plan to share the file. Of course, this does not apply to material in the public domain. Or your own works (your work is somewhat protected whether you have filed with the US Copyright Office. I say "somewhat," because by officially filing you have a better chance of protecting yourself and your intellectual property, because you then have legal proof of possession.) Same applies to logos used without express consent -- unless it is your own creation. Logos are protected by trademarks rather than copyright. You could be setting yourself up for serious legal trouble if you wrongly use Intellectual Property owned by someone else. Does the word "theft" ring a bell? As a songwriter and artist myself, I have the right to protect my creative property and I will. Artists work harder than many people realize and it is unfair, immoral and just plain wrong to deny the copyright/trademark owner the credit or income they are due. Now... Even if you are using public-domain material or your own works, some web-space providers do not allow MP3 or other multimedia files on websites on their servers. Check your TOS.

What industry is required to use the hippa security standards?

Health Care Industry

here all of them

1. Health Care Industry

2. When you are assigning a user's rights, it is dependent upon their job needs.

3. User Accounts applet then change an account and select the account. Then click change the password

4. enter a wrong password

5. Power-On passwords, Drive Lock passwords, and passwords used to authenticate users.

6. Kerberos

7. Smart Card

8. Its used to prove you are who you say you are.

9. Certification Authority example: Verisign

10. It would be easy to guess by both humans and http://wiki.answers.com/Why_is_the_name_of_your_pet_not_a_strong_passwordprograms designed to hack passwords.

11. Standard Account

12. There should be a folder called 'Public' under your 'Start' - 'Documents' folders.

13. NTFS

14. The Vista tool used to encrypt an entire hard drive is BitLocker Encryption

15. The Vista tool used to encrypt an entire hard drive is BitLocker Encryption.

16. The chip holds the BitLocker encryption key (also called the startup key)

17. Press the windows key and L. Another method is to press ctr-alt-del.

18. Worms

19. A Trojan Horse.

20. The link could cause a program to be installed on your computer (called a "virus") that could do very bad things (steal information, delete or modify your files, etc). Don't even open e-mails from people you don't know. Just delete them.