Chapter 3: Computer And Internet Crime
Vignette
Trading Scandal at Society General
1. Peter Gumble, European editor for Fortune
magazine, comments, "Kerviel is a stunning example of a trader breaking
the rules, but he's by no means alone. One of the dirty little secrets
of trading floors around the world is that every so often, somebody is
caught concealing a position and is quickly - and quietly - dismissed...
[This] might be shocking for people unfamiliar with the macho,
high-risk, high-reward culture of most trading floors, but consider
this: the only way banks can tell who will turn into a good trader and
who even the most junior traders to take aggressive positions. This
leeway is supposed to be matched by careful controls, but clearly they
aren't foolproof." What is your reaction to this statement by Mr.
Gumble?
If you didn’t make the rule, break the rule. Trading guidelines that
don’t come from the hard-won personal experience don’t lead
to self-growth. Don’t let the internalized trading police force you into
trading in a socially approved manner.Don’t let the inner and outer voices of tyranny control your trading
2.
What explanation can there be for the failure of SocGen's internal
control system to detect Kerviel's transactions while Eurex detected
many suspicious transactions?
I think the explanation can there be for the failure of SocGen's internal control system to detect kerviel's transaction while Eurex detection many suspicious transaction is that the issue of collusion and indicating even more widespread weaknesses in internal controls.
Whistle-Blower Divides IT Security Community
Discussions Questions and Answers
1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?
For me Yes, because when Mike Lynn knows about the hacking of the CISCO routers, he decided to reveal the secrets about it and let other people know about it.
2. Do you think that CISCO and ISS were right to pull the plug on lynn's presentation at the black hat conference? Why of why not?
I think No, because as what I have understand Mike Lynn's presentation at the black hat conference is the key for the others to know the information that Mike Lynn's discover.
3. Outline a more reasonable approach toward communicating the flaw in the
CISCO routers that would have led to the problem being promptly
addressed without stirring up animosity among the parties involved.
Chapter 4: Privacy Concern Abound with New IRS Systems
Vignette
1. What information about you is being held, who
is holding it, and what is this information being used for?
2. What measures are being taken to safeguard this
information and what happens if it is inadvertently or deliberately stolen?
For me to safeguard this information as a user we should be attentive in all times, we should be more wiser and be one step ahead in all the people in our surroundings/environment because if this will be stolen i thinks many changes will happen in our nation or may be in our life.
Case Study # 3: Is Google Watching You?
Discussions Questions and Answer
1. How does Google’s business model use personal
data?
Google is firmly committed to the privacy of our advertisers and users. [
While Google does add a cookie to a user's computer when he/she clicks
on an ad, this cookie expires in 30 days, and Google does not associate
a user's search activity with his/her ad click history. Further, Google
does not collect or track personally identifying information, and does
not reveal individual information to third parties.
Users who do not wish to participate in tracking activities can easily
disable Google's conversion tracking cookie in their Internet browser's
user preferences settings. These users will not be included in your
conversion tracking statistics. ]
http://www.weegy.com/?ConversationId=F53E8D73
2. What do you think are the major privacy concerns raised by Google's business model and applications?
The privacy concerns of Google business revolve around the ability of
anyone around the whole having instant access to high-resolution imagery
including personal property, houses, cars, etc. Having such imagery and
photographs in clear detail showing cars (color, make and models) and
people opens up a hornet's nest of privacy issues.
http://wiki.answers.com/Q/What_are_privacy_concerns_with_Google_Earth#ixzz1tiriWtDs
3. Do you think Google has taken adequate
measures to protect its users privacy?
Yes, because of it's personal information.
Google is adamant that its changes, which users cannot opt out of,
are perfectly legal and says they will result in a better online experience.
The company has scrapped over 60 different privacy notices for various products
and integrated their main tenets into a master privacy policy. It has also made
the language of this document far easier to understand. And it has extended the
way in which it shares information across its services to include YouTube and
search histories so that people who, say, watch videos of a particular musician
on YouTube will see adverts for that same performer's music when they are using
Gmail or other Google products. Alma Whitten, the company's director of
privacy, product and engineering, stressed in a blog post that these changes neither alter users' existing privacy
settings nor result in more data being collected about them.
http://www.economist.com/blogs/babbage/2012/03/online-privacy
No comments:
Post a Comment