Technology Notes
Security measures:
· Smart badge/Active badge: microprocessor controlled badges broadcast infrared identification codes every 15 seconds, which are picked up by networks transmitted to a badge receiver database that is constantly updated.
· These badges are used to
o IDENTIFY: it can be used to identify authorized employees and allow them entrance into buildings and access to files on computers.
o FIND: Employees can locate each others using computers and their badges.
o REMEMBER: One can at the end of the say see everywhere they went and to whom they communicated with by using their badges.
· Conferences use badges to help people meet each other. The badges have information on each person’s history and hobbies so they can find people with similar interests.
Justice on the Electronic frontier
· As computer crimes have increased, governments have created laws to prevent crimes and serve justice to those who violate them.
· Many hackers are punished for their crimes while some go unnoticed. Sometimes those that are found are unpunished because there was no solid law t the time preventing them from committing the crime, or it is argued that the government is violating their rights
· Man questions are raised over whether civil liberties relate to the electronic world and where the lines should be drawn.
· Laws such as the Telecommunications act, The Digital Millennium Copyright Act and Communications Decency Act have been passed to define the civil liberties and laws on the digital world.
· Although these laws were created to raise order in the digital world, they have sparked controversy over the rights of the people in this world of rapid technological change.
Security and Reliability
· Some of the issues with security are not related to crime, they have more to do with whether a computer system is reliable and can handle or prevent glitches and bugs
· There are more often software glitches than hardware problems.
No comments:
Post a Comment