Wednesday, January 27, 2010

Internet Privacy

If employers are allowed to read emails sent by their employees, what rights should universities and students have? Typically, the university provides the email system and owns the hardware and software. Note that in the conventional private employer/employee relationship, the fact that the employer owns the network underlies the courts' general view that employers are free to monitor their employee usage. How does this argument apply in the university setting? What about the arguments regarding propertization of data (i.e. that employers "own" data stored on the computer an employee uses because they own the computer)?

Wednesday, January 6, 2010

what would you do?

1. You are the CEO of a three-year-old software manufacturer that has several products and annual revenues in excess of 500 million dollars. You've just received a recommendation from the manager of software development to hire three notorious crackers to probe your software products in an attempt to identify any vulnerabilities. The reasoning is that if anyone can find a vulnerability in your software, they can. This will give your firm a head start on developing parches to fix the problems before anyone can exploit them. You're not sure, and feel uneasy about hiring people with criminal records and connections to unsavory members of the hacker/cracker community. What would you do?

ans:

To prove that my products is good I am willing to test it with some hacker/cracker. But I'm the one who will choose the tester. I will make some research to the profile of the chosen tester. If they found some problems in my product I will offer them a very good job in return they will not do anything bad about my company or my product or to squeel the weakness of my product for the mean time until I solve the problems.

what would you do?


2. You have just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and its customers. You have been given 90 days and budget of 1 million dollars. Where would you begin, and what steps would you take to fix the problem?

ans:

The 1st thing I will do is to research about the software that hackers use to attack the company. If ever I will know the software they use I will do research again on how to blocked the software. In that kind of budget I can ask some friends to help me. I will make the strongest guardwall in their company.

Wednesday, November 25, 2009

†Blood Politics†

Everybody knows what happened in Ampatuan,Maguindanao. It is the worst political war in Mindanao happened for the 1st time. The battle of two big names in politics here in mindanao Mangudadatu and Ampatuan. Ampatuan leads the people of Maguindanao and ARMM but Mangudadatu reigns in Sultan Kudarat and Cotabato City. Mangudadatu family wants to enter in Maguindanao

♫1st assignment in IT 104♫

Should I Continue my position as officer in ROTC?

I am thinking if i pursue my position in ROTC because it is hard for me to manage my time. Instead of ROTC I also have other priorities in my studies. But if I didn't continue my position I cannot get my issues from Philippine Air Force. I try my best to find brighter way of this problem. ♀God bless Philippines♀