Saturday, 11 June 2011

Cyber Terrorism




In this part I discuss a little about a subject that maybe not familiar to many of people; cyber terrorism
Cyber terrorism is the use of internet by terrorists to fear or threaten the people or society or another kind of cyber terrorism is the disruption of information that is stored on computer networks. But the terrorists deny the existence of cyber terrorism and call it as hacking. Or better, when information of individuals or organizations is in danger by unethical users.
They themselves define it activities that threaten the safety of individuals or organizations internet. Unfortunately, some countries that have problem with each other use the opportunity of cyber terrorism against each other. In fact, the transformation of the war from traditional definition to the modern one, provide an opportunity for countries to attack against the enemies. But, according to the dangers of cyber terrorism and threats against folks, the importance of legislation an international law against cyber terrorism is increasing.
Although the legislation of the law is important, the commitment of countries to implement it effectively is more important.


source:www.symantec.com



Thursday, 9 June 2011

Privacy Policy

In my previous post I pointed out the privacy on internet that involves the security aspect of individual or information. Where the vast information is on the internet so, it needs some security to keep them safe. In this part I am going to discuss about risks of internet privacy.
We know that in today’s world or better technological world, many of people are subject to threats of privacy. Companies will watch what you are visiting online and also to infiltrate the information and send advertising while watching their sites. People set up account for social networks like facebook or myspace or they enter bank or credit cards information to various websites. So, having concerns are normal or people through using internet. These concerns may be about malicious acts such as misusing their personal information or even sometimes acts such as spreading of spywares that are software’s which collect information form user’s computer without permission.
So, privacy policy is provided on most of social networking sites to ensure their users about the protection of their entered information. For instance, on facebook the privacy policy is that users have ability to block certain individuals from seeing their profile and prevent them from the access to their picture and videos. However there is weakness in this site that is when users deactivate their profiles, their information will remain on the facebook’s database.
Me, as a user, believe that it should be the user’s right to apply such settings when providing personal information on the internet.





Wednesday, 8 June 2011

Privacy Policy



When you are the owner of your website you cannot control that your visitors come from neither which countries nor which countries and visitors view your websites. So the best way is to have strong privacy policy that covers all the anticipated which you are likely to do business with them. And with the nature of privacy policy on the internet concerns related to misuses of information given will be the same in many countries. So laws and requirements in this field will be similar to each other.
When there is really no way to control that who will visit the site, so the best and safest way is creating a privacy policy for the website within the scope of jurisdiction that the countries are in.
So in my opinion, in this situation when any problem related to your business website raises it will be determined by the court of jurisdiction or country in most instances.
In next post I will discuss more about privacy policy issues.  



Tuesday, 7 June 2011

continue...










It seems to be difficult to identify the users who have access to the not legal version of standards however there are some ways to prevent the violation of copyright. One way is to give awareness to users about for example the consequences of copyright violation. The other way can be a famous method that is used to identifying the whole information of author and then protecting the copyright by inserting bit into audio, video and even digital images.
It is considerable that there is no internationally protection for authors’ works and it depends to the particular country. There are some categories that cannot be protected by copyright like investigations and the performance that are not written or recorded. Or short phrases, names, concepts, designs are not protected by copyright if they are not recorded or fixed.
I believe that having the copyright law is not merely a guarantee to protect authors’ work but implementing this law is needed to guarantee the authors’ works. For example, although Iran has copyright law (for domestic products), but the government does not implement this law effectively. So, we witness the breaches the copyright in our country.   





Monday, 6 June 2011



In this part I am going to discuss about securing a copyright. When a work is created by the author for the first time and registered under copyright, it is protected by copyright automatically. But, securing the copyright is so difficult because there are lots of ways that the rules broken.
In cyber space or internet the problem is in more expand. By increasing in technologies in computer networks, anybody who can read about something can also make a copy. It is important to notice that web pages are the same as tangible products and the content of them are the same as magazines, books and required copyright protection. Taking the content of one website and then reproducing and using it in another website become easy and available by digital technology. So, the original work of author will be in danger. In order to protect the authors’ works, we can consider these followings;
The first is to ensure that the work is properly marked. The second could be registration of the work that is required when the author wants to claim the work belonging. And the third one is if the author works in group so coworkers’ agreement is important and required.



source: www.researchcopyright.com

Sunday, 5 June 2011

Introduction to copyright

Copyright, you may heard a lot this word about books, musics or other intelectual works. This right is given to author of created work for a number of years. But it is considerable to know that who can claim for copyright? The answer is when the work is created in the fix form, copyright protection takes place. When the copyright is the property of the author imidiately one by creating the work. The author is the only person who can claim the copyright. This right has different categories to work or better these are some tangible works that are protected by copyright; musical works, dramatic works, pantomimes and graphic works and sound recordings.
In future posts I will discuss more about securing the copyright and how we can prevent copyright law violation.   




Wednesday, 1 June 2011

Royal Wedding Spam

Perhaps you also received a hot email in your inbox as “Kate’s wedding dress details-leaked”. Or “Prince William’s bachelor party photos”. If you click on these emails, then you will probably be spammed. Royal wedding has created frenzy for Kate and wedding-related searches on Google and millions of people around the world expected to view the ceremony on their computers. But the problem or danger is here when there are lots of people around the world online. For instance, in such events the cyber criminals are looking to crash the wedding hype. Phishing scams and royal wedding related search engine poisoning.



As I pointed out in previous post, phishing scams spread malicious software by using email attachments and with search engine poisoning, criminals are tempting unsuspecting users to websites with malware. When the users click on these sites, the malware infest their computers, looking for sensitive personal information. For example, the experts found that around 22 of the first 100 searches on Google for royal wedding ceremony were poisoned links. This act is a sample of computer crime and based on act 1997, section 3, a person who is found guilty is liable to a maximum RM50'000 fine or to five years imprisonment or to both.
 As a result, there are some simple ways to prevent the dangers of scammers. The first one would be not to click on emails that conclude “leaked” or any secret information. The second is when a website seems to be risky; you can use ones that are more familiar and reputable to you. The royal wedding was an e-royal wedding because of so many information about it is on sites and blogs and this provided plenty of ways for cyber criminals to do what they want to do.     







Source: www.topics.cnn.com