answersLogoWhite

0

Computer Security Law

Computer security means protecting the confidentiality, integrity, and availability of information stored on, processed by, and transmitted by computers. In order to achieve this, various governments and organizations have established laws, regulations, and standards for securing computers and the data stored, processed, and transmitted by them. This category is for questions about existing and proposed laws and standards specifically related to computer security including the contents of the laws & regulations, who is legally responsible, who/what the laws/regulations/standards apply to, how the security is evaluated, and how it is documented.

310 Questions

How can apply for special executive officer in Mumbai?

How can i apply for the Special Executive Officer in Mumbai?

what is the Eligibility Criteria for Being a Special Executive Office?

where should i contact for Special Executive Officer ? is there any Contact Number.

Please! Reply me ASAP. at

mail Id: manoj_shaan12@yahoo.co.in

Mobile : +91-9820045515.

What circumstances warrant information to be denied the Controlled Unclassified information designation?

  • To conceal law violations.
  • To prevent embarrassment to a person.
  • To prevent embarrassment to the organization.
  • To delay the release of information that does not require protection.

How do you get rid of slanderous blogs about you?

The best you could hope for is to sue under any available slander laws and have a court issue an order for the deleting/removal of the blog. If they award sufficient damages it may be enough motivation for the blog author to not repeat the slander. Note that you have to meet the legal requirements to prove slander before you can win such a case. Occasionally you may be lucky enough that the web service hosting the blog will take it down for you if you contact them and complain, but that's the exception.

Computer wiz hackers spammers how do you get a message out?

Most spammers utilize very illegal means to broadcast their messages. They usually use bot networks - groups of machines they have compromised and turned into "zombies" - to launch their massive email barrages. There are several reasons for doing this:

1) since spamming is illegal in many areas, they try to insulate themselves from being identified as the source of the spam

2) Even where spamming is not explicitly illegal, the crap they are hawking often is - either outright or because it is fraudulent. Consequently, it is valuable to them to make it hard to identify the source of the spam.

3) By using someone else's computer to send the spam, they insulate themselves from retribution from those they are spamming

4) They don't have to actually buy the hardware, they can just steal it (or at least the use of it) by hacking it and installing their software on it without the owner's permission. "Owning" a machine in this way is just a slang term meaning that they have control of it - they certainly don't own it from a legal standpoint.

The details of how they compromise other people's machines and set up bot networks will not be presented on this website - which has a policy of not aiding and abetting criminal activities.

Ia posture will be reviewed every 2 years?

This answer is per DIACAP (Defense Information Assurance Certifications and Accreditation Program - DODI 8510), as the defacto standard in the field of information assurance; historically the process was over a three year period. However, after due diligence and oversight, it was discovered that many IA Managers and supporting IT personnel were essentially waiting until the last 6 to 12 months (of the 3 year cycle) before full IA reviews were conducted. Currently, in the IT/IA community, the IA posture is considered a dynamically changing process;as changes in the enterprise occur the IA Posture is updated, reviewed and documented, providing a living and current IA life cycle. This process ensures effective management in preventing and/or mitigating the day to day risks and threats of an IT environment as they can occur and immediately record/document the change.

What is the UK law on surveillance?

It depends what you mean by surveillance. Anyone can mount security cameras on their property - provided it's not deliberately aimed into another person's home. You can record amy image from your own security cameras (but you cannot 'broadcast' images of people without their consent). You cannot use covert equipment in someone else's home without them being aware the equipment is installed. Some examples...

A... You fix a camera to your house, pointing down your drive, to monitor your car - Perfectly legal.

B... Your camera 'happens' to have a clear view of the bedroom in the house opposite - Illegal (invasion of privacy).

C... You 'hide' a camera inside a teddy bear - because you suspect your babysitter is abusig your child. Legal - so long as you don't post the footage on the 'net.

Explain clearly the function of the DAA instruction in an 8085A microprocessor system?

DAA (Decimal Adjust for Addition) is used following a normal ADD, when it is known that the input data represented BCD (Binary Coded Decimal). It compensates for the half byte carry that might occur because the BCD format is not the same as the binary format.

Differences between computer law and computer ethics?

Computer Law - is a set of recent legal enactments, currently in existence in several countries. while Computer Ethics more on covers for the actions that is done with the computer, whether it is ethically good or unethical.

Data misuse act?

Not too sure about any "data misuse act", but theComputer Misuse Actof1990

is an Act of theParliament of the United Kingdomwhich criminalizedunauthorizedaccess to computer materials,unauthorizedaccess with intent to commit or facilitate commission of further offences,andunauthorizedmodification of computer material. Ammendments to the act were intended to bring it into consistency with theEuropean Convention on Cyber Crime, which included some stipulations on how data stored on computers should be used.


TheData Protection Act 1998is aUnited KingdomAct of Parliamentwhich defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs theprotection of personal datain the UK.

What is a program managers relationship with the DAA?

PM (or SM) can report to the DAA.

It is also permissible for both the PM (or SM) and the CA to report to the DAA.

The DAA can not be assigned to report to the PM (or SM).

The PM (or SM) and DAA can not be the same person.

What 3 laws have had a significant effect on information security in the U S?

There are more than 3 laws with significant effect on information security, but three of them are:

  • Gramm-Leach-Bliley Act (GLB), also known as the Financial Services Modernization Act of 1999
    • This one requires financial institutions to develop a written information security plan that describes how the company is prepared for, and plans to continue to protect clients' nonpublic personal information. (The Safeguards Rule applies to information of any consumers past or present of the financial institution's products or services.)
  • Sarbanes-Oxley Act of 2002 (Pub.L. 107-204, 116 Stat. 745)
    • This one dictates requirements for information and information technology audits in publicly traded companies
  • Federal Information Security Management Act of 2002("FISMA", 44 U.S.C. § 3541)
    • This one assigns specific responsibilities to federal agencies, the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) in order to strengthen information system security. In particular, FISMA requires the head of each agency to implement policies and procedures to cost-effectively reduce information technology security risks to an acceptable level.

Is it illegal to put an MP3 on a website?

== == If you do not own the copyright to the music/song and do not have the express permission of the legal copyright holder, then yes, it is illegal. Especially if you plan to share the file. Of course, this does not apply to material in the public domain. Or your own works (your work is somewhat protected whether you have filed with the US Copyright Office. I say "somewhat," because by officially filing you have a better chance of protecting yourself and your intellectual property, because you then have legal proof of possession.) Same applies to logos used without express consent -- unless it is your own creation. Logos are protected by trademarks rather than copyright. You could be setting yourself up for serious legal trouble if you wrongly use Intellectual Property owned by someone else. Does the word "theft" ring a bell? As a songwriter and artist myself, I have the right to protect my creative property and I will. Artists work harder than many people realize and it is unfair, immoral and just plain wrong to deny the copyright/trademark owner the credit or income they are due. Now... Even if you are using public-domain material or your own works, some web-space providers do not allow MP3 or other multimedia files on websites on their servers. Check your TOS.

What industry is required to use the hippa security standards?

Health Care Industry

here all of them

1. Health Care Industry

2. When you are assigning a user's rights, it is dependent upon their job needs.

3. User Accounts applet then change an account and select the account. Then click change the password

4. enter a wrong password

5. Power-On passwords, Drive Lock passwords, and passwords used to authenticate users.

6. Kerberos

7. Smart Card

8. Its used to prove you are who you say you are.

9. Certification Authority example: Verisign

10. It would be easy to guess by both humans and http://wiki.answers.com/Why_is_the_name_of_your_pet_not_a_strong_passwordprograms designed to hack passwords.

11. Standard Account

12. There should be a folder called 'Public' under your 'Start' - 'Documents' folders.

13. NTFS

14. The Vista tool used to encrypt an entire hard drive is BitLocker Encryption

15. The Vista tool used to encrypt an entire hard drive is BitLocker Encryption.

16. The chip holds the BitLocker encryption key (also called the startup key)

17. Press the windows key and L. Another method is to press ctr-alt-del.

18. Worms

19. A Trojan Horse.

20. The link could cause a program to be installed on your computer (called a "virus") that could do very bad things (steal information, delete or modify your files, etc). Don't even open e-mails from people you don't know. Just delete them.

Explain how copying a computer software is a crime?

Just like a book or a movie, computer software can be owned. If you copy it without permission from the owner, you are violating their ownership rights and effectively stealing a copy of it.

Is it illegal to use a copyrighted website in one country and put it into a international market?

If you mean copy a site that is copyrighted in one country and then use it as if it were your own but hosted in another country, then - YES - that is illegal. You have just violated the copyright within the country.

As an example: if you copy a book published in the UK and copyrighted there and then publish it and sell it in India, the UK can prosecute you - but only in the UK. Anyone selling the pirated book in the UK could be prosecuted. It might be difficult, however to get any prosecution in India unless they respect the UK copyright.

The situation with copyrighted material and content of a website. People can - and do - steal content and host it on servers in other countries. The most that can usually be done is to request that the host shut it down under threat of having their entire company added to blacklists of hosting services that are automatically blocked by responsible ISPs in most countries.

If you mean - is it illegal to copyright a website in one country but host it elsewhere, then - generally NO - the copyright applies to the website, not the host. To use the book analogy: if you copyright a book but use a publisher in another country to actually print it, the copyright is still valid. Nothing about copyright law says where you have to print it; it just says that no one else can copy the book and sell it without your permission within the area where it is under copyright.

Is it legal to hack online games?

The legality of "hacking" an online game depends on what you mean by "hacking".

In the most common use of the term - it is illegal to hack an online game. In order to hack an online game, you are usually hacking the server that hosts the game. This is breaking and entering into a server that does not belong to you.

  • If you are using cheat codes - that may not be illegal.
  • If you alter the code, that's the kind of illegal hacking mentioned above.
  • If you have legal access to the code - for instance if it is an open source community owned game, you may be able to legally "hack" it and modify it.