Comment on Student’s Reading Critique (The Security Principles to Live by) I certainly agree to the assertion “to limit the access the user has to only what is necessary and by limiting their security privileges…” Since different software is programmed using codes and while the internet is wider in scope, it is difficult to control any threat to the security of one’s computer. A computer software expert can penetrate even the most top secret codes because they are programmable. I understand that limiting the access would pose problems on the users and I could see that it is a result of this action. Anyway it would be right to give other options which are to replace the old codes with new ones. I guess, this has a lot more advantages for our future application designers than coming up with new software using old codes. First, the new codes will give the hackers who are using the old codes no opportunity to trace its path; secondly, the new codes may be programmed with more advanced security features; and, third, it will spark the new trend in software development. Likewise, old codes installed in updated software (or new developed software) may only limit further progress in terms of software development because of incompatibility issue with highly technologically advanced hardware to be invented someday. As our technology advances, software developers must also insure security implications to the product. Coming up with new product grounded in research may be the right solution to lessen the threat in using computer. Never invent/develop product that may bring security problem to the users. Comment #2 on Student’s Reading Critique (The Problem of Cybercrime) Computer hacking is really a serious problem for people who are using the internet especially for top government and/or organization whose security is a top most needed. For now, this is unavoidable and nothing is done with it. I agree that this condition may pose problems in the future. Hacking for this reason is a cybercrime as it can penetrate an individual’s passwords, bank transactions and credit cards. As the writer noted, the internet for hackers gives them the easy way for theft to do stealing whose identity remains untraced. As I see it, everyone was able to expound on the activity of computer hackers and the problem they bring to all internet users which include private organizations and governments around the globe. Given this issue, there must a consolidated decision coming from and represented by each country in the whole world in order to design a set of guidelines which may lead towards the formulation of cyber laws and course of actions against illegal the internet activities. Thus, restructuring and/or redesigning of operational structure of the internet should be grounded on cyber laws that will be created, because any violation committed by a hacker will be subjected to punishment. No one would be excuse from the law once enacted. I agree with the opinion regarding prevention of cybercrime; however, individual sites may also add security features in its protocol to keep the privacy and security of the information of the subscribers. I think, in the absence of cyber laws, individual site owner and user may observe safety measures which have to be explained well, such as what messages is suspicious and which is not. I guess, security alarms may be installed in a system to prevent hackers from entering one’s account. Lecture Discussion In my opinion, the most pervasively exploited computer system is system software which can be penetrated by viruses through an infected USB and downloaded files from the internet. The virus enters in and destroys the system while others (auto run) penetrate the system to report secret information stored in the memory. Either way, the virus is created to increase the demand for antivirus product or to steal user’s information. Viruses can be treated using antivirus software; it means, it can be prevented as long the program is updated regularly. I guess the one that poses severe problem in the future is computer hacking as it is seen operational nowadays. Not only individual persons are hacked but also important information of one’s country; remember the ‘I-love-you’ virus which had damaged worth of billion dollars worldwide. It made The Pentagon and CIA to shut down their mail system just to get rid of it. Week 5: Summary of the reading “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage As the title suggest, the article was about a new technological innovation introduced in the market called “cloud computing” which is seen as the next infrastructure for data hosting and for deploying software services that would essentially lower capital cost. While the authors’ sees this technology to provide strategic advantage for business organization, the
Get 20% discount on your first order