Wednesday, May 2, 2012

Chapter 3 and Chapter 4:

Chapter 3: Computer And Internet Crime

Vignette

Trading Scandal at Society General


1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble? 

If you didn’t make the rule, break the rule. Trading guidelines that don’t come from the hard-won personal experience don’t lead to self-growth. Don’t let the internalized trading police force you into trading in a socially approved manner.Don’t let the inner and outer voices of tyranny control your trading

2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

I think the explanation can there be for the failure of SocGen's internal control system to detect kerviel's transaction while Eurex detection many suspicious transaction is that the issue of collusion and indicating even more widespread weaknesses in internal controls.


Whistle-Blower Divides IT Security Community

Discussions Questions and Answers

1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

For me Yes, because when Mike Lynn knows about the hacking of the CISCO routers, he decided to reveal the secrets about it and let other people know about it.

2. Do you think that CISCO and ISS were right to pull the plug on lynn's presentation at the black hat conference? Why of why not? 

I think No, because as what I have understand Mike Lynn's presentation at the black hat conference is the key for the others to know the information that Mike Lynn's discover.

3. Outline a more reasonable approach toward communicating the flaw in the CISCO routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved. 


Chapter 4: Privacy Concern Abound with New IRS Systems

Vignette


1. What information about you is being held, who is holding it, and what is this information being used for?

2. What measures are being taken to safeguard this information and what happens if it is inadvertently or deliberately stolen?

For me to safeguard this information as a user we should be attentive in all times, we should be more wiser and be one step ahead in all the people in our surroundings/environment because if this will be stolen i thinks many changes will happen in our nation or may be in our life.

Case Study # 3: Is Google Watching You?

Discussions Questions and Answer

1. How does Google’s business model use personal data?

Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. ]  

http://www.weegy.com/?ConversationId=F53E8D73 

2. What do you think are the major privacy concerns raised by Google's business model and applications?

The privacy concerns of Google business revolve around the ability of anyone around the whole having instant access to high-resolution imagery including personal property, houses, cars, etc. Having such imagery and photographs in clear detail showing cars (color, make and models) and people opens up a hornet's nest of privacy issues.

 http://wiki.answers.com/Q/What_are_privacy_concerns_with_Google_Earth#ixzz1tiriWtDs

3. Do you think Google has taken adequate measures to protect its users privacy? 

Yes, because of it's personal information. 

Google is adamant that its changes, which users cannot opt out of, are perfectly legal and says they will result in a better online experience. The company has scrapped over 60 different privacy notices for various products and integrated their main tenets into a master privacy policy. It has also made the language of this document far easier to understand. And it has extended the way in which it shares information across its services to include YouTube and search histories so that people who, say, watch videos of a particular musician on YouTube will see adverts for that same performer's music when they are using Gmail or other Google products. Alma Whitten, the company's director of privacy, product and engineering, stressed in a blog post that these changes neither alter users' existing privacy settings nor result in more data being collected about them.

http://www.economist.com/blogs/babbage/2012/03/online-privacy

No comments:

Post a Comment