privacy - - Privacy The individuals right to keep certain...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Privacy Security - The individuals right to keep certain -Security is a tool to build privacy Information private - Security technology aide individuals in protecting their privacy. 1) 8 privacy Principles a. Collection Limitation- limits to amount of data b. Purpose Specification c. Data Quality- relevant, accurate, up-to-date d. Use Limitations- data should not be disclosed e. Security safeguards f. Openness- general policy about policies/practices g. Individual participation h. Accountability 2) What Steps do you take? a. Anti-Malware b. Anti-Spyware c. Firewall d. O/S updates e. Vigilance 3) Malware- “malicious software” a. Malware vs Virus a.i. The 1 st examples of Malware were known as Viruses a.ii. Virus term dates back to 80’s a.ii.1. Michelangelo in 1992 a.iii. Needs software in order to reproduce b. Virus b.i. A program that attaches itself to a file, reproduces, and spreads from one file to another. c.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2012 for the course COMP APPS 101 taught by Professor Ganu during the Spring '07 term at Rutgers.

Page1 / 3

privacy - - Privacy The individuals right to keep certain...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online