Federal Court in Manhattan and was sentenced to life in prison without

Federal court in manhattan and was sentenced to life

This preview shows page 118 - 124 out of 272 pages.

Federal Court in Manhattan and was sentenced to life in prison without possibility of parole Source: (marketplace )
Image of page 118
DEEP/DARK WEB PROPONENTS The people building the darknet are idealists who believe passionately in the right to privacy They say our battle for privacy is pathetic, we lost it a long time ago We have to redefine privacy, our world is undergoing very accelerated change As long as some work for surveillance, we must continue to work for privacy A place to escape the ever-watchful eye of big brother, to know real freedom, although most people just want enough freedom to be comfortable
Image of page 119
The threat to our privacy is being seriously threatened because of these emerging and in place technologies , Increase amount of images online and increase ability of facial recognition Increase computing power available via cloud computing Ubiquitous computing via vast networks and mobile devices Government surveillance using corporate network providers servers to collect data Extensive, sophisticated hacking as a business Acceptance of human chipping We are trading our convenience for privacy People are more savvy in using technology, but do not know what it can do to steal their privacy Internet is borderless, but laws are national , therefore, it is diffi cult to regulate the internet People fail to do the basic security best practices like keeping their computer updated and using secure passwords and guarding the information, therefore privacy invasion is growing THREAT TO OUR PRIVACY SUMMARY
Image of page 120
Information security is a broad concept that involves dealing with any threat to computerized systems , such as viruses, hackers, accidental loss of data or systems, natural disasters (e.g., earthquakes, fl oods), fi res etc. Three main categories of threats are, 1. Denial/disruption of service 2. Unauthorized Access 3. Theft and Fraud INFORMATION SECURITY THREATS
Image of page 121
Threats are those that, 1. render a system inoperative 2. limit its capability to operate 3. make data unavailable Result from, 1. intentional acts 2. careless behavior 3. natural disasters Natural disasters cannot be prevented but can be planned for (backups, redundancy, etc.) Careless behaviors , such as forgetting to perform proper backups of one’s computer, not installing security updates and tools, leaving computer so that is easily accessible DENIAL/DISRUPTION OF SERVICE
Image of page 122
The Chicago Board of Trade and Chicago Mercantile Exchange closed. Banks were unable to process transactions. Workers rushed to save important documents — including Cook County birth, death and marriage certifi cates dating back to 1871 — stored in subterranean levels of offi ce buildings. The fl ood became national news and led Gov. Jim Edgar and President George H.W. Bush to declare Chicago a disaster area.
Image of page 123
Image of page 124

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture