Monday, September 13, 2010

Security
http://www.mcafee.com/us/local_content/white_papers/threat_center/wp_imuttik_vb_oct2000.pdf
This example is a virus case study, that harms the computer.The example touches base on how security can be breached on any form of hardware, because often virus blockers do not work efficiently.
http://www.vendorsafe.com/images/pdfs/CaseStudy_FastFood.pdf

The pdf file shows how a security breach can compromise a whole business. The stealing of credit card numbers is one of the main things that happens in security breaches, and many people lose money as well as the industry and company involved. It is a huge disadvantage for the company because they lose a lot of money but the hackers get the advantage. It is morally wrong for hackers to steal credit card numbers but they steal a lot of money and make a profit.
Privacy:
http://www.ucdmc.ucdavis.edu/compliance/guidance/privacy/example.html

The article is about breaches of privacy and how they can happen in various different ways, for example they show how people can be monitored when they use their computer. Privacy can always be compromised when using machines and you can never be sure that they work. People are faced with the decision of weather or not to breach someone else's computer files if they are given the chance, touching upon moral and ethical issues.
http://www.monitoringsoftwareonline.com/

The article shows how parents now have the ability to monitor what their kids view on the computer. Is this not wrong? It seems to be an invasion of privacy and is ethically wrong, each person, child or adult, has the right to look at what they want to look at what they want because they have that freedom. The advantage of this is that parents can make sure their children stay off harmful websites, but a disadvantage is they are taking away the freedom and rights of their kids.