Thursday, August 15, 2013

COMPUTER AND INTERNET SECURITY








Title of the Article: Awareness and challenges of internet security
Author: Hawkins, Steve ; Yen, David C. and Chou, David C.
Publisher: Emerald Group Publishing Limited
Document URL : http://search.proquest.com/docview/212305494?accountid=141440

Abstract:


     This article presents an in-depth discussion of the awareness and challenges of internet security in both government and private sectors. It begins with an overview of internet security and the technologies used in protecting the data on a computer system. Some of the popular methods are : firewalls, user authentication, data encryption, key management, digital certificates, intrusion detection systems (IDS), virus detection, virtual private network (VPN) and extranets. Organizations in both the government and private sectors are aware of internet security and both sectors take action to protect their internet data and corporate systems. Also, both of them have their own strengths and weaknesses on internet security but they are both prepared to take challenges to develop a better internet security system.

Three Things I learned from my Reading Assignment:

      There are a variety of methods to protect data from intrusion. Current developments in technology provide a number of ways to secure data transmission and storage. Some of the methods are firewalls, user authentication, data encryption, virus detection, and VPN (Virtual Private Network) among others.
      Both government and private sectors are fully aware of securing  their data from intrusion. Depending on the nature of their work and their particular needs, both are taking actions to safeguard their valuable data from damage. They can choose from a variety of methods to protect their data from intrusion
       No matter how protective both government and private sectors are with regard to safeguarding their most valuable data, still there are hackers out there who are always ready to do everything just to intrude in any library's  computer system. Challenges for the government sector include: hiring IT professionals from the private sector, developing virtual private networks and providing training for IT staff. 

Implications:

       Building a secured library network is indeed a very huge and challenging task. Careful thought, adequate planning and the confident perspectives and strong recommendations of a group of IT people or staff will spell the success of a secured information system and network in the library. This group of IT experts has an important task of configuring the network properly so that it is scalable and flexible to handle additional hardware and software as the network grows. If any element in the network system is misconfigured, a hacker could gain entry and intrude into the library information system and network. The above-mentioned methods of securing the network can be utilized.
      It is not enough that there are methods providing assurance of protection. On the part of the members of the library staff , there should be awareness training and education. Carelessness on their part will affect the library network's security. The best that they can do is to constantly keep watching and be on guard for possible intrusions so that they can bring them immediately to the attention of IT experts. Faculty members as well as government officials should also be aware of the threats in internet security.
      The passage of Republic Act 10175 also known as "Cybercrime Prevention Act of 2012" and the "Data Privacy Act" proves that the Philippine government is not only aware but is really vent on curbing illegal access to computer networks by making punishable under the law all forms of misuse, abuse and illegal access. The government recognizes the need to protect and safeguard the integrity of computer and communications systems, networks and databases by facilitating the detection, investigation and prosecution of offenses. With theses legislations by congress, hackers will somehow think twice before starting to execute their dark plans of making intrusions or illegal access to computers which may greatly affect library services.
      
       

Friday, August 9, 2013

COMPUTER ETHICS



Title of the Article: Netiquette
Author: Scheuermann, Larry and Taylor, Gary
Publisher: Emerald Group Publishing , Limited (1997)
Document URL: http://search.proquest.com/docview/219853714?accountid=141440

Abstract:


     This article entitled "Netiquette", a term produced by combining the words "network" and "etiquette", identifies the most frequently cited specific suggestions for online users. It refers to the proper etiquette on computer networks. Most breaches of politeness and courtesy do not always bring retribution but it may reflect poorly on the individual user. A user who knows the rules of this emerging culture may have an advantage over the other user who does not know the rules.

Three Things I learned  from My Reading Assignment:

1.    I have learned about the following most frequently cited specific suggestions for proper netiquette:
        1. Think first. (Never write while angry)
        2. Write in upper and lower case. UPPER CASE ONLY looks like SHOUTING and lower case only                  is difficult to read.
        3. Avoid abbreviations. "pls fwd pod atn amy asap" may make perfect sense to a seasoned employee                    in a delivery company but would be meaningless to anyone else. (Please forward proof-of-      
                 delivery to the attention of Amy as soon as possible) Even if the receiver knows familiar            
                 abbreviations the complete words are still easier to read.
         4. Be concise. Brief, well-written notes usually have far more impact than those filled with unneeded  
                  extra verbiage.
         5.  Avoid smileys (or emoticons as they are sometimes called. People don't read with their heads
                   sideways to the monitor.
          6. Don't flame. Respond to others in e-mail conversations the same as if the conversation were face-
                  to-face. Flames are insults or crude remarks sent to other network users. Flames take focus  
                   away from the substance of a discussion.
          7. Don't take offense easily. Some messages are not sent to tease or deride.
          8.  Don't evangelize. It is much better to offer a humble opinion and write with reason and diplomacy
                      than to preach.
          9.Know the audience. Most news groups have their own expectations. Reading a news group a while
                   before posting to it is good advice.

2.     It is good to know some Netiquette rules for advertising:
           1. Rule #1:Never place blatant advertisements in News groups unless that group is specifically for
                   advertising purposes. Generally, this means that ads can only be placed in some sort of  
                   classified section.
            2.  Rule #2:Never e-mail information to people who have not requested it. Sending junk mail is the
                     most cardinal of sins on any network!

3.      Employers who allow their employees to access noncompany networks can effectively set standards  
             for internet use. They should see to it that the set rules of conduct are being followed by the
             employees.

Implications:

    The rules mentioned above are just suggestive of anyone who desires to be good and polite while communicating and interacting in the cyberspace environment. Some may agree and disagree depending on the culture that they have accustomed to. An act that is polite in one place may not be acceptable in another place.  Your act or behavior might be offensive to others when you think that it is just fine. But it's good to know that we have these rules than none at all because your integrity as an individual is at stake.
     Furthermore, employers play a role in checking that the set rules of conduct are being followed. Employees who are sending e-mail messages as a business tool must must do it appropriately or it can harm the company's public image which might result in loss of business.
     In a library setting, a librarian's  being polite in answering reference questions through e-mail can help a lot  in  promoting the public image of a library.