Posts

Showing posts from August, 2017

Ethical hacking

Image
The ACM in 1992 adopted the ACM Code of Ethics and Professional Conduct, it consist of 24 statements of personal responsibility. Some of them are: Contribute to society and human well being, Avoid harm to others, Be honest and trustworthy, Respect privacy to others, Honor confidentiality, etc. Some of them involve more professional topics like: Strive to achieve highest quality, Acquire and maintain professional competence, Know and respect existing laws, Honor contracts, agreements and assigned responsibilities, etc. To the full article you can check this website  https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct#sect1 . Here are some existing and really serious example of some of the statutes written in the code of ethics that this author believes is important for the reader: 1) don't spy the work of others 2) Respect the plants   3) Don't harm other ppl 4) Don't enter the girls bathroom 5) Be careful with the water, you ca...

Ethic and legal responsibilities in computer security

We as bigger understanders of the technology, are responsable for the safety of our society in the matter of computer security. People don't understand the danger that this technology revolution is bringing and it's in our hands to inform and educate people about this. The Ken's class involves always crazy stories about how the Tec's Staff is always putting the students in danger by making decisions without taking in count the students computer security safety. From MiTec and Blackboard to the physical installations inside the Campus, we need to be a force of disruption and unconformity about this mishandling actions. via GIPHY The Mexican government hasn't make enough efforts to enhance the security measures in the IT department, the laws are outdated and it doesn't seems like the laws are well written and without loopholes. Here is the last news about the Mexican laws involving the computer informatics. http://www.informatica-juridica.com/legislac...

Integrity, Availability and Confidentiality

Image
Three goals: Integrity, Availability and Confidentiality I see this words as the key for a product involving IT in the 21st century, let's take a look to the definitions.  Integrity: the quality of being honest and having strong moral principles that you refuse to change. Availability: suitable or ready for use; of use or service. Confidentiality: the state of keeping or being kept secret or private.  To ensure the security of the customers, a product or service must be certain that this 3 goals are accomplished. Every time you download an app or suscribe to a webpage, you are giving your personal data, every second you spent logged into Google or Facebook you are giving your personal data to them, every word you type on Instagram or Gmail that word is saved in some server and accesible by a person. Now that you know this, this three words now look important, you want to be confident that this companies and the people they hire have integrity, you want to be confide...

Why should we study computing security

Image
Why should we study computing security: For this class I was expecting a very different kind of course, in the past, i heard my older friends to tell me about the class with the coolest name in all our career but in the first day of class i receive something a lot more different that what i was expected. I've never had any class with Ken Bauer, all i have heard were different kind of opinions, some of them good and other ones nice. In the first class he have me the impression of a weird and kind of crazy (in a nice funny way) Canadian overwhelmed for the insecurity that surrounded us. He told us of a weird rubber duck that has the ability to copy all the data of a PC in a short amount of time, also that he usually has problems with the Campus Staff about any kind of security-wise problems, all this information that he began to spit out to us was kind of overwhelming and make me feel a little crazy. After the first class, I downloaded a Password Manager, changed all my passwo...