Form 4 Notes
Thursday 09th February 2012
Privacy
in IT refers to data and information privacy.
Ways
Computer Technology Threaten Our Privacy:
It is
done through:
• cookies
• electronic
profile
• spyware
Cookies:
• used
to identify users by web casting, ecommerce and other web applications
• contain
user information and are saved in the computer hard disk
• used
by some websites to store passwords and track how regularly we visit a website,
that’s how we become potential targets for web advertisers
• enable
web sites to collect information about your online activities and store them
for future use, then the collected details will be sold to any company that requests
for it.
Electronic
Profile:
• electronic
profile is the combining of data in a database that can be sold to the Internet
by the company to the interested parties.
• this
database is in a form such as magazine subscription or product warranty cards
that had been filled by online subscribers.
• the
information in electronic profile includes personal details such as your age,
address and marital status.
example of electronic profile in facebook. |
Spyware:
• refers
to a program that collects user information without the user’s knowledge.
• can
enter computers, sneaking in like a virus.
• is
a result of installing new programs.
Privacy can be protected by:
(a) Privacy law
The privacy laws in Malaysia emphasises on the following:
• Security Services to review the security policy
• Security Management to protect the resources
• Security Mechanism to implement the required security services
• Security Objects, the important entities within the system environment
(b) Utilities software
Example: anti-spam program, firewall, anti-spyware and antivirus.
Exercise: http://www.scribd.com/doc/80992731/Exercise-Privacy-in-computer-usage
(a) Privacy law
The privacy laws in Malaysia emphasises on the following:
• Security Services to review the security policy
• Security Management to protect the resources
• Security Mechanism to implement the required security services
• Security Objects, the important entities within the system environment
(b) Utilities software
Example: anti-spam program, firewall, anti-spyware and antivirus.
Exercise: http://www.scribd.com/doc/80992731/Exercise-Privacy-in-computer-usage
No comments:
Post a Comment