About Me

My photo
The boy's name Anthony \a-ntho- ny, an- thony\ is pronounced AN-tha-nee. It is of Latin origin. English form of the old Roman family name Antonius, probably of Etruscan origin. Mark Anthony (82-30 BC), Roman triumvir and general, sat on the throne and had a tempestuous political career with Queen Cleopatra of Egypt. Saint Anthony (third century) was an Egyptian hermit monk who founded the first Christian monastic order and is traditionally renowned for his resistance to the devil. According to legend, he lived alone in the wilderness for over 80 of his hundred-some years. In England, the name is usually spelled and pronounced without the "h". The German and Russian version is Anton; Antoine is French. Actors Anthony Quinn, Anthony Hopkins, Anthony Perkins, Tony Curtis, Anthony Banderas; photographer Antony Armstrong-Jones, Earl of Snowdon; composer Anton Bruckner; playwright Anton Chekhov; basketball player Anthony Mason; singer Marc Anthony.

Sunday, December 5, 2010

IT-104 ANTHONY O. CORBITA

1. why has there been a dynamitic increase in the number of computer
    related security incidents in recent years? (Src. Ethics in Information Technology
         2nd Edition By Geoge Reynolds P.68)

ans>
            Because as the modern technology are growing, It's indicates that many people are getting ahead of it where in they can think such as a bad doings to cause an incident that affect the cyber world.   that's why  the number of the computer security incidents are growing in recent years.





2. what are some characteristics of common compuetr criminals including thier objectives .
  (Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)

ans>
        The ff, are the characteristic of the cyber criminals and their objectives 

¦-Hacker-¦
 

   to gain publicity; ther\ir the one who  limits the system of the cyber world.
¦-Craker-¦ 
   they are the one who steal data,cost problem and curapt system.
¦-Insider-¦
   to have some money              
¦-industrial spy-¦ 
   it gain competitive advantage. 
¦-cyber criminals-¦ 
    to make money.
¦-cyber terrorist -¦ 
   destroy key infrastructure components.



3. what actions must be taken in response ot a security incidents.
 (Src. Ethics in Information Technology 2nd Edition By Geoge Reynolds P.68)

ans>
   ,CONTRACTORS,PART TIME WORKERS AND EDUCATING EMPLOYEES:
       - employees,contractor and part time workers must be educated and aware about the importance
         of security or cyber security so that they will be motivated and enhance  to understand and follow the security policy and stop the crimes.
 

No comments:

Post a Comment