Saturday, August 13, 2011

SECURITY TECHNOLOGY

III.  ACCESS CONTROL SOFTWARE


Image credit from Google.com.ph
Access control is a mechanism which a system grants or revokes the right to access the data. It is commonly used by the user to login to a system using "Authentication System".  




It controls the following data:
  • File permission such as create, read and edit on file servers.
  • Program permissions, such as the right to execute a program on application servers.
  • Data rights, such as the right to retrieve or update information in a database.


(http://hitachi-id.com/concepts/access_control.html) 




Also it include the following:

  • Automate and unify visioning, role management, password management, single sign-on and privileged account management.
  • Ensure that identity and access management activities are supporting business objectives.
  • Provide segregation of duties and access control.


(http://www.quest.com/identity-management/)

SECURITY TECHNOLOGY

 IV.  FIREWALL


Firewall is a system designed to prevent unauthorized access to a network and servers.All messages, pictures, and other personal data passes through the firewall and any suspicious files were automatically blocked. It serves as protection from any harmful and unnecessary objects inside and outside the internet.It works closely to the router program which each network packet to determine whether to forward it on its selected destination. Also, It includes proxy server which make network request on the behalf of the server and workstation users.
As of today, Firewall serves as a great savior of computer files. Because it does block unknown pop-up data and application which somehow contain harmful effect to my files and to my computer. 


Big companies like Apple™ Inc. and Microsoft™ has a vast and great firewalls that ensures their computer safety. Like us, It has great help for them to develop and send personal messages without the disturbance of other people. These firewalls ensures that privacy will be achieved like the other security technology devices had. It just need proper knowledge and some training so that it could do its job nor task very well.

SECURITY TECHNOLOGY

II. ENCRYPTION


Image credit from Google.com.ph
    Encryption is the conversion of data into "ciphertext " which cannot be easily understood by other people. It is used during wars to keep the enemies away from obtaining the contents of their transmissions. In order to get the encrypted codes and signals back, You need to have what they call "decryption key" to undo the encryption algorithm. The stronger the cipher, the harder it will be broken down by unauthorized access of others.


           
      
    Encryption is commonly used to wireless communications and carrying out sensitive transactions like credited cards transactions online and discussion of a company secret between different departments of the organization. It aims to secure our information so that no one will stole or manipulated the important files we have. Encryption may give others the confidence to start online jobs in the internet or make business online. Maintaining privacy in our personal communications, business and other important matter is what everyone desires.

   



SECURITY TECHNOLOGY

I. BIOMETRIC


Biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes:
  • To verify 
  • or To identify users. 

Biometrics is the most secure and convenient authentication tool. It can not be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity.

Biometric technology can help the society to protect itself from possible threats of crimes and other negative effects related to it. It can serve as a surveillance
using facial and body recognition technologies, The modern researchers  hope to use biometrics to automatically identify known suspects entering buildings or traversing crowded security areas.



Here comes a list of biometrics :

                                

Image credit from Google.com.ph
  • Fingerprint 
A fingerprint looks at the patterns found on a fingertip.There are a variety of approaches to fingerprint verification, such as traditional police method, using pattern-matching devices, and things like moire fringe patterns and ultrasonics. This seems to be a very good choice for in-house systems.






  • Hand Geometry

Image Credit from Google.com.ph
This involves analyzing and measuring the shape of the hand. It might be suitable where there are more users or where user access the system infrequently. Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording.





  • Retina
Image credit from Google.com.ph
A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. This technique involves using a low intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point


  • Iris
Image credit from google.com.ph
An iris-based biometric involves analyzing features found in the colored ring of tissue that surrounds the pupil. This uses a fairly conventional camera element and requires no close contact between the user and the reader. Further, it has the potential for higher than average template-matching performance.




Image credit from Google.com.ph
  • Face
Face recognition analyses facial characteristics. It requires a digital camera to develop a facial image of the user for authentication. It was used in most of offices and government institutions to serve as a record of some sort of important file.





  • Signature
Image credit from Google.com.ph
Signature verification analyses the way user signs his name. Signing features such as speed, velocity, and pressure are as important as the finished signature's static shape. People are used to signatures as a means of transaction-related identity verification.



  • Voice
Image credit from Google.com.ph
 Voice authentication is based on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics requires a microphone, which is available with PCs nowadays. Voice biometrics is to replace the currently used methods, such as PINs, passwords, or account names. 






But as Biometrics are used these days,
It turns out that it has negative effect such as:
  • Some Biometric apparatus or devices are difficult to handle..
    Proper training is extremely required.
  • Time may affect the accuracy of biometric data. For example a person got old,
    Biometric data may cause changes and sometimes bring error to the data.


There are many things that we should remember about these devices.
It is neither it brought cure nor harm to us. Possibility that it may lessen the crime rate to our country is not hard if we just help each other to live our life to its limits with no one is going to be hurt or thrown down. 







Internet Reference: http://www.peterindia.net/BiometricsView.html

Saturday, July 2, 2011

  The Absence of Ethics...


Image Credit : Google.com
Modern aged society composed of civilized and well-organized people who make developments in our everyday lives. The simple software and hardware are now customized with new design, applications and good use as well as its different and unique appearance as well. As long as the creativity and wide imagination of the technology developers were present,


As the year passes by, we experience changes to our environment.Maybe it is due to the sufficient knowledge of some individuals who wanted to make life easy. Knowledge that is enough to threat or save everybody from the dangers beyond his or her inventions. We should be aware and alert  at these matters at all cost.  


Image Credit : Google.com
The evolution of computer technology as I see has good effects  and has the bad effects as well. Usually  advancements were made to protect not to  harm, but why there's still computer terrorists and computer hackers? They usually wanted to mess up things on the net and to other people's PC.The most common they're  doing  was changing the  passwords of accounts (online PC games,and other online data), spreading computer-harmful viruses, and stealing important files from private accounts.


Sometimes they can access on high security systems of large companies and spread harmful viruses to shut down thousands of computers. These people are called as "Crackers" which usually became another problem of our society nowadays. Their computer skills were a little bit advanced than hackers and causes serious damages on the millions of computers.


(en.wikipedia.org/wiki/Hacker_(programmer_subculture)#Definition)






                   Video Credit from heyimamarf - hacking computers


The video above shows the "user" created an account and changed the passwordof the computer by just using a command prompt (computer program). He also used a hypercam software and I don't know for what purpose.  

















Saturday, June 18, 2011

The Computer Ethics


Computer Ethics deals about the right decisions regarding the professional and social conduct. The computer ethics was originated in 1950 by Norbert Weiner,  an MIT professor and inventor of an information feedback system called "cybernetics". He published a book called " "the Human use of human beings" which contains the basic foundations about the computer ethics.


Computer ethics is very important as the computer users increase everyday and there is nothing we can do to check what kind of people are using it.Therefore it is just to educate many people about ethics and the other issues which can be considered violation to ethics.The primary concern of ethics was identifying ethical issues, which somehow fall in the copyright issues concerning privacy and censorship.


Computer Ethics plays 3 important roles namely:


✔ Prevents misuse of Information
Computers have made the world come closer, be it personally or professionally! Most of us find it more convenient to shop online rather than going out. For this we are asked to give out our personal information like name, date of birth and most importantly, our 'credit card information'! Ask yourself, if you know that people don't follow computer ethics everywhere, would you feel safe to give out all this information? On the contrary, if you have read their privacy policies and know that they abide by the cyber laws and computer ethics, you know for a fact that your personal information will not be misused.


Prevents Theft of Intellectual Property
What is intellectual property? Well, unlike physical forms of properties like car or house, intellectual property refers to the property created by the mind! The internet consists of various intellectual properties which includes works of various researchers, writers, song artists and so on. Without the presence of computer ethics, the work created by the intellect of one person can be easily copied and plagiarized by someone else. Imagine how you would feel if your poetry has been copied and publicized under someone else's name? Now do you know what following computer ethics and privacy policies is important? 


Makes Your Computer a Better and Safe place to be At
Your computer is not just an electronic device for communication, it is your data store, your photo album, your work recorder, your social network, your calculator and what not…it is what you are! If you get involved in downloading information or accessing portals that you are not allowed to, you are opening the doors of various issues and threats like viruses and Trojans that can illegally enter your system and crash it completely! On the other hand, if your system is used in the way it is suppose to, you are creating a safer and a better atmosphere wherein you can rest assured that your work and your personal information is absolutely safe and secure.


By 
Published: 6/21/2011



Relation of Laws and Computer Ethics 


With the technology moving quickly, People tend to find many ways on how to develop many applications with its newest features and styles that please many individuals. Some are helpful and some are not. Some are harmful and some are useful. The Laws implemented on the what they termed "Cyberspace" or the "Internet" was not enough to protect the computer users around the globe. There are three laws that has been created in order for us to follow but I think its just another rules that has been ignored by many. 


Here are the laws:


1. The First Law of Computer Ethics:
"I will not create or recommend that harms the user on his or her data."

2. The Second Law of Computer Ethics:
"I will not disobey the user's instructions or place unnecessary obstacles in the user's way."

3. The Third Law of Computer Ethics:
"I will not distribute or rcommend programs or any other untrusted software that will cause major problems on the society and the government."

This explains our responsibility as an IT student or as an individual that we should help each other's side and not to destroy or cause problems every single day of our life. As a matter of fact, Some of these 3 Laws are not present anymore on the progress of technology advancement. These absence of Computer Ethics can somehow be unpleasant to the minors which can be abused on their usage to the computer without hesitation.

Computer Technology Advancement on Ethics


Ethics are within us since our childhood..Its just we are the ones on how to use it on our own ways. Like for example the Computer technology advancements of today,
It has unique features of style, application and of course limitations. 
The advancements came up in effective and useful things to the people and government.
By the computer advancements achieved by the professional programmers and other researchers, They've made our Lifestyle, Business, Education and Health simple. 
These achievement also proved that there is no limitation on the imagination and creativity of every single individual.


It somehow ease the problems of our everyday lives. But as these advancements become a big help to us somehow I saw its big threat on us too. By the way advancements occur, Many Life is in danger. For Example, The advancements of Computer technology was being used in making deadly weaponry like nuclear missiles, Hi-Tech Bomb prototype or model and customized powerful guns. 
Most of the time, These weapons were used to harm not to protect and to abuse not to save.


"Consider a child for example at a young age taught by his big brother for example how to scam nor hack on accounts of others. Due to the advancements of technology, He uses a modern and unfamiliar equipment to many people which makes his task to be completed. "


These example scenario may occur nowadays. The government maybe are not aware of this but us.. This society.. what are they doing?


Many unethical individuals of today showed up as the progress came. Individuals
which manipulate other's creation just to create problems to other people and just to get what they wanted. An example of these are:


Hacker A person who writes programs in assembly language or in system-level languages, such as C. Although it may refer to any programmer, the term means  laboriously "hacking away" at bits and  bytes. The term is used to define people who illegally enter computer systems, insert viruses and illegally gain information.  True "hackers" resent the illegal hackers who sully their names. 

Cracker - A person who performs an illegal act and breaks into a computer system without authorization.  The cracker's purpose is to do harm, to damage or destroy riles, steal credit cards, insert viruses, perform computer espionage, etc.

Cyberpunk - An online delinquent, with high tech skills,  who breaks the law by breaking into computer systems.  The term comes science fiction novels such as Neuromancer,  by William Gibson 

(by: http://mason.gmu.edu/~montecin/CS103/lec13ethics-lawWEB.htm


Computer Advancements helped us to get thing simpler and better. It can bring us more useful things if ethics will be present at all cost. Because the ethical behavior of a person is a big key to his success. The behavior which will not violate any laws and avoid ethical errors is the important thing we lack of today. Some might have this traits and some are not. 


As newest computer advancements will soon came up maybe nor tomorrow, We should be knowledgeable about these. Knowledge that can destroy and erase the wrongdoings of others for the sake of the youth that are unfamiliar to these hideous crimes. 


Maybe its the right time to do the right thing as an ethical and responsible individual....