Martes, Agosto 16, 2011

SECURITY TECHNOLOGY



BIOMETRICS

Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for AUTHENTICATION purposes.

Advantages of Biometrics : 

*  Increase security - Provide a convenient and low-cost additional tier of security.

* Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy     punching. 

* Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent     unauthorised use of lost, stolen or "borrowed" ID cards. 

*  Reduce password administration costs. 

*  Replace hard-to-remember passwords which may be shared or observed. 

*  Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and     scalable control solution for facility and network access 

*  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! 

*  Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. 

*  Unequivocally link an individual to a transaction or event.



Disadvantages of a biometric system
·         The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
·         It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time
·         For people affected with diabetes, the eyes get affected resulting in differences.
·         Biometrics is an expensive security solution.

WHAT ARE THE POSSIBLE PROBLEM USING BIOMETRICS


One of the most crucial factors in the success of a biometric system is user acceptance of the device. It must cause no discomfort or concern for the user. If people are afraid to use the device, they probably will not use it properly, which may result in users not being granted access.
The biometric device must work correctly. When it functions properly, it does two things: it keeps unauthorized people out and lets authorized people in. No device is perfect. In the biometric world, the probability of letting the wrong person in and right person out, is characterized by the “false accept” and the “false reject” error rates.This contrast and the frustration of dealing with a high number of false rejects will have authorized users and management alike looking for a way to replace the biometric system with something else if these factors are not considered up front.


WHAT IS ENCRYPTION



Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm. Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption.There are many types of encryption and not all of it is reliable. The same computer power that yeilds strong encryption can be used to break weak encryption schemes. Initially, 64-bitencryption was thought to be quite strong, but today 128-bit encryption is the standard, and this will undoubtedly change again in the future.


ADVANTAGES AND DISVNATAGES OF ENCRYPTION
The single most important reason for using encryption is to preserve confidentiality. This means that only an authorized receiver can read the message (the receiver must have the appropriate decryption key). The disadvantage is the overhead it takes to encrypt and decrypt the messages, especially if a digital certificate is involved, because it may have to 
be authenticated as well, and that takes time.

CONTROL ACCESS MEMORY

Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure. Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control.
The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment. Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys. We use our PC day in and day out in almost every feature of our lives. Certainly, working, playing, getting in touch with friends and even shopping can be done right in the comforts of our homes thanks to our PCs and Internet connections. Nevertheless, for something we put your faith in heavily each day, the PC is one of the things we take so easily for granted. Give it some thought - how many of you splurge even just a couple of minutes dusting off your PC?

FIREWALLS

A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routersthat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.


What are the advantages of Firewall Use?
1.     A feeling of increased security that your PC and contents are being protected.
2.    Relatively inexpensive or free for personal use.
3.    New releases are becoming user friendly.
4.    You can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity.
5.    Some firewalls but not all can detect viruses, worms, Trojan horses, or data collectors.
6.    All firewalls can be tested for effectiveness by using products that test for leaks or probe for open ports.

Disadvantages of use
  1. Firewalls evolve due to cracker's ability to circumvent them increases.
  2. "Always on" connections created by Cable and DSL connections create major problems for firewalls. This can be compared to leaving you car running with the keys in it and the doors unlocked which a thief may interpret as an invitation to "Please steal me".
  3. Firewalls cannot protect you from internal sabotage within a network or from allowing other user’s access to your PC.
  4. Firewalls cannot edit indecent material like pornography, violence, drugs and bad language. This would require you to adjust your browser security options or purchase special software to monitor your children's Internet activity.

POSSOBLE PROBLEM:
















Martes, Hulyo 5, 2011

Hacking an Art Form

Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.Well, if you want to do it for the right reasons, it is called ethical hacking. I also see it as a good thing in networks if you are trying to protect your network, because you can't stop a hacker from getting in, unless you know how it's done. Whether you call it white or black hacking, or just cracking. If its legal hacking, it's ethical.
Computer hackers are very legal without risks as long as you're following ethical guidelines. There are absolutely no laws preventing you from computer hacking. This is using your knowledge of computers to break into secure networks, personal computers, websites, banks, etc. and changing, saving or getting data, money or other bits of information. This is extremely illegal and could land you in to the jail. I have to listen to ignorant people talk about "all the bad hackers in the world" all the time, but they don't realize that the hackers are the people who gave us the Internet, PCs in general, game consoles, and before computers, things like the automobile and electricity. Hackers are innovators and make existing things better by figuring out how they work, and make them work better.
Hacking can be used in both good and harmful ways.Nobody was jailed just because they were hacking for a good thing .Some naugthy teenagers hack for fun.Some professionals hack for money, some of them is just to help government. Its you who decide your destiny.Do you want to be jailed or awarded? Hacking is too bad to do, the people who hacked in the computer can be jailed up to 5 years,probably more,so before you go into someones computer.Think about how long you would be away from your family.Think about how would you treat you when they find out that you are a hacker.

Huwebes, Hunyo 23, 2011

Relations of Ethics


RELATIONSHIP BETWEEN ETHICS AND LAW
Law is the system of binding rules of action or conduct that governs the behavior of people in respect to relationships with others and with the government. The law establishes rules that define our rights and obligations, and sets penalties for people who violate them. Laws also describe how goverment will enforce the rules and penalties. Among others, these laws ensure the safety of citizens, protect property ,and protect the economic and environmental interests of society.How are ethics and laws are related? Laws are intented to reflect popular belief about  the “rightness or wrongness” of particular acts and are, like ethics, built upon a moral foundation. In most countries laws represent an attempt  to codify ethics. One would expect that laws would be congruent with the prevailing moral values of a society. For example, most of people would agree that the murder  of an innocent person is an immoral act. Laws that prohibit  murder reflect this ethical standard. The murder of the innocent is both ethically and legally  prohibited in every cultures. As society’s need and attitudes evolve, law emerge to reflect these changes. Occasionally, governments create and enforce laws that many people believe to be unjust or immoral. Individuals may consider the same act either right or wrong, depending on their stage  or level of moral development.
RELATIONSHIP BETWEEN PROFESSIONAL ETHICS
The professional carries additional moral responsibilities to those held by the population in general and in society. This is because professionals are capable of making and acting on informed decisions in situations that the general public cannot, because they have not received the relevant training. For example, a lay member of the public could not be held responsible for failing to act to save a car wash victim because they could not give an emergency. This is because they do not have the relevant knowledge. In contrast, a fully trained doctor (with the correct equipment) would be capable of making the correct diagnosis and carrying out the procedure and we would think it wrong if they stood by and failed to help in this situation. You cannot be held accountable for failing to do something that you do not have the ability to do. Ethics are rules and values used in a professional setting.
RELATIONSHIP BETWEEN COMPUTER TECHNOLOGIES

Computer is the most important thing in our lives. Now we are in the technology time and everything is connected with computers. Most of colleges and Universities have classes that deal with computers. I think the majority of people have computers in their homes and they deal with it a lot. We use computers in many different ways. For example, some people use it in checking their e-mails and chatting with their family and friends. Other people use computers to write their school projects and others in their work. They communicate with the other companies and so on. Many majors required from students to work with computers. I want to be in the computer and information system major. This major is one of the businesses majors. The work condition for this major is tough and you have to work hard. Time of work is mostly about 40 hours a week and sometimes they work at night and weekends. Technology can make the world an easier, more comfortable place to live in for future generations. The home and outdoor environments will undergo startling changes, making them more convenient to live in. Typical homes will cater to the personalized needs of each occupant.The first advantage is that computers make your life easy. I mean by that students who have the Computer and information System degree will make the job easy and the work will go fast. The advantages for this occupation are many. The first advantage is that you will find a job quickly and faster than people who aren’t in the computer field. Nowadays companies are looking for the young people with the high degree in computers and today most of the work deals with computers. I feel that the advance of technology is a good trend for our society; however, it must be in conjunction with advance in education so that society is able to master and understand technology.