IT104 Presentation Skills in IT

Wednesday, February 24, 2010

USA Patriot Act:

the Good, the Bad, and the Sunset

Section 216The Patriot Act substantially changes the law with respect to law enforcement access to information about computer use including Web surfing. Reaching for an analogy from the old rotary dialed telephone system, the Act extends provisions written to authorize installation of pen registers and trap and trace devices, which record outgoing and incoming phone numbers, to authorize the installation of devices to record all computer routing, addressing, and signaling information. The government can get this information with a mere certification that the information likely to be obtained is relevant to an ongoing criminal investigation.Section 203Previously, domestic law enforcement and foreign intelligence collection operated on separate tracks. This separation was seen as necessary because of the very different legal regimes that are associated with domestic law enforcement and foreign intelligence collection. The events of September 11, which involved several individuals who had lived in our country for some time, made it clear that more cooperation between domestic law enforcement and foreign intelligence collection was necessary. Section 203 facilitates this cooperation by allowing "foreign intelligence information" gathered in criminal investigations by domestic law enforcement to be shared with the intelligence community. In this manner, section 203 enables the intelligence community access to critical information that might otherwise be unavailable. The definition of "foreign intelligence information" contained in the Patriot Act is quite broad. Foreign intelligence is defined to mean "information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, or foreign persons or international terrorist activities." The definition goes on to specifically include information about a U.S. person that concerns a foreign power or foreign territory and "relates to the national defense or the security of the United States" or "the conduct of the foreign affairs of the United States." The sharing of such a broad range of information raises the specter of intelligence agencies, once again, collecting, profiling, and potentially harassing U.S. persons engaged in lawful, First Amendment-protected activities. Section 203 provides some protection against abuse by requiring that when information originates from grand juries or wiretaps, the attorney general must establish procedures for the disclosure of "foreign intelligence information" that identifies a U.S. person. These safeguards need to be strengthened in two regards. First, to prevent unnecessary dissemination of information about a U.S. person to the intelligence community, such procedures should also be required for information obtained in domestic criminal investigations generally. Second, information subject to grand jury secrecy rules should only be disseminated with authorization from a court.Section 206The Foreign Intelligence Surveillance Act (FISA) facilitates domestic intelligence gathering related to foreign powers by allowing the collection of such information without the legal restrictions associated with domestic law enforcement. Section 206 of the Patriot Act modernizes FISA wiretap authority. Previously, FISA required a separate court order be obtained for each communication carrier used by the target of an investigation. In the era of cell phones, pay phones, e-mail, instant messaging, and BlackBerry wireless e-mail devices such a requirement is a significant barrier in monitoring an individual’s communications. Section 206 allows a single wiretap to legally "roam" from device to device, to tap the person rather than the phone. In 1986, Congress authorized the use of roaming wiretaps in criminal investigations that are generally subject to stricter standards than FISA intelligence gathering, so extending this authority to FISA was a natural step. The main difference between roaming wiretaps under current criminal law and the new FISA authority is that current criminal law requires that law enforcement "ascertain" that the target of a wiretap is actually using a device to be tapped. Section 206 contains no such provision. Ensuring that FISA wiretaps only roam when intelligence officials "ascertain" that the subject of an investigation is using a device, before it is tapped, would prevent abuse of this provision. For example, without the ascertainment requirement, it is conceivable that all the pay phones in an entire neighborhood could be tapped if suspected terrorists happened to be in that neighborhood. Bringing FISA roaming wiretaps in line with criminal roaming wiretaps would prevent such abuse and provide greater protection to the privacy of ordinary Americans.

Section 213The 1986 Electronic Communications Privacy Act granted the government the authority to delay notification for search of some forms of electronic communications that are in the custody of a third party. Section 213 statutorily extends the ability of law enforcement to delay the notice to any physical or electronic search with a showing that notice would create an "adverse result." This provision is an effort to improve the government’s ability to investigate suspected terrorists by granting law enforcement greater leeway to operate clandestinely. To a large extent, section 213 simply codifies existing law enforcement practice in a manner consistent with recent court decisions. Nevertheless, the "adverse result" standard (defined in 18 U.S.C. § 2705), by virtue of its ambiguity, creates the potential for abuse. As a result, section 213, which is not currently subject to the four-year sunset contained in the Act, should, nevertheless, be carefully reviewed at that time. Section 217If someone unlawfully enters your home, you can ask the police to enter your premise without a warrant to investigate. Section 217 clarifies that similar authority applies to "computer trespassers." This allows law enforcement, with the permission of the owner of a computer, to monitor a trespasser’s action without obtaining an order for a wiretap. This provision constrains the ability of hackers to use computers without being detected.Although most law-abiding computer users’ online activities will not be monitored by the government as a result of section 217, the new authority may be overbroad. A "computer trespasser" is defined as anyone who accesses a protected computer (which includes any computer connected to the Internet) without authorization. Individuals who exceed their terms of service agreements with their Internet service provider or individuals who use their computer at work to download an MP3 file could be subject to intrusive government monitoring. While the need to respond quickly to malicious hacking, such as denial of service attacks, provides a basis for this provision, section 217 should be amended to require court authorization for monitoring of individual users that exceeds forty-eight hours in duration.

Section 218Prior to the enactment of FISA in 1978, the intelligence community had virtually unchecked authority to conduct domestic surveillance of U.S. citizens and organizations. FISA created a special court to ensure that "the purpose" of domestic intelligence gathering was to obtain foreign intelligence information. The FISA court structure and sole purpose standard attempted to balance the need to collect foreign intelligence information without the constraints of the Fourth Amendment with increased protections for Americans exercising their First Amendment rights. But the sole purpose test has created operational difficulties for foreign intelligence investigations that uncover criminal wrongdoing and lead to an investigation of the criminal conduct. The events of September 11 further blur the line between foreign intelligence investigation and domestic law enforcement and the ability to jointly work the case and share information between the intelligence and law enforcement communities has become more important in the context of the investigations of Al Qaeda. Section 218 loosens the standard of a FISA investigation by requiring a showing that the collection of foreign intelligence information is "a significant purpose" rather than "the purpose" of an investigation. Section 218 is an important tool for counterterrorism but, since probable cause is not required under FISA, it also raises the possibility that U.S. citizens who are not terrorists could have their homes searched and communications monitored without probable cause. Therefore, section 218 deserves special attention when it expires in four years.






First assignment in final

The Guidelines involve eight principles, which in different variations are often touted as "fair information practices":

1.) Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.

2.) Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, compete and kept up-to-date.

3.) Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.

4.) Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Principle 3 except:

* with the consent of the data subject; or
* by the authority of law.

5.) Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data.

6.) Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.

7.) Individual Participation Principle: An individual should have the right:

* (a) to obtain from the data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;
* (b) to have communicated to him, data relating to him
o within a reasonable time;
o at a charge, if any, that is not excessive;
o in a reasonable manner; and
o in a form that is readily intelligible to him;
* (c) to be given reasons if a request made under sub-paragraphs (a) and (b) is denied, and to be able to challenge such denial; and
* (d) to challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended.

8.) Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above.

Wednesday, January 27, 2010

Last Laboratory Activity

PRIVACY

===>is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. Often means that the personal identity, or personally identifiable information of that person is not known.Sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive.Privacy can be seen as an aspect of security, one in which trade-offs between the interests of one group and another can become particularly clear.


PRIVACY PROTECTION AND THE LAW

===>currently there is no national law to protect the privacy of the information you share online, The Privacy Protection Law protects you from the random collection of personal information The law enables you to access or correct information on file which pertains to you.

currently there is no national law to protect the privacy of the information you share online.

Wednesday, January 6, 2010

2. You have just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and its customers. You have been given 90 days and budget of 1 million dollars. Where would you begin, and what steps would you take to fix the problem?

===>First is to inquire the company situation on that particular time so that you can easily search
how the hackers success in their mission,second is to inquire also the security.Why is it that he
didn't noticed the hackers? and research also all the employee background.
Because , the hackers can't accomplished their mission without the presence of maybe one or two
employees.or maybe more than.

my first midterm quiz

4. Your friend just told you that he is developing a worm to attack the administrative systems at your college. The worm is "harmless" and will simply cause a message - "Let's party!" - to be dispalyed on all workstations on Friday afternoon at 3 p.m. By 4 p. m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?

===>For me i'm going to advised him that his plan can only produced a danger to them.
although there is a possible happen that it made them publish but also think the good of others.

Wednesday, December 2, 2009

Are IT Workers Professional? Why?

Yes, it workers are professional because, they finish their course or their degree course, they also having their license as a Worker and their Employment Contract duly signed by the Employee or workers and so on.For that reason they are belong to a professional workers.

Wednesday, November 18, 2009

FIRST ASSIGNMENT (PRELIM)


"HOW TO MAKE A BUSINESS SUCCESSFULLY"
  • In starting business, make it sure that all needed information are gathered.
  • find your co-investor in order to have more capital.
  • consider the consequences of your business in order for you to aware those problems that you encounter.
  • Guidelines and principles to invest a business to know what are those important in your business to make it successful.
  • you must to develop your skills by taking those trainings to handle your business successfully.
  • if you put any decision, always depend on your guidelines to maintain your success.
  • Always evaluate the result of your operation in order for you to know if your business gain or loss.
The virtue ethics approach is important for your business to promote common goods and to aware the employees for those moral and immoral action.