1.)What is the difference between security and reliability? How are they related?

ovenforksqueeSecurity

Nov 3, 2013 (3 years and 9 months ago)

71 views

1.)

What is the difference between security and reliability? How are they related?


Security

is the degree of protection against danger, damage, loss, and criminal activity.
Security
as a form of protection is

structures and processes that provide or improve
security as a
condition.

A

form of protection where a separation is created between the assets and the
threat. This includes but is not limited to the elimination of either the asset or the threat.

Reliability

(systematic definition) is the ability of a pe
rson or system to perform and maintain its
functions in routine circumstances, as well as hostile or unexpected circumstances. Also it has
the ability of a system or component to perform its required functions under stated conditions
for a specified period

of time.


2.)

If you own
a personal computer, how
secure is that machine? How did you decide how much
security was enough?

If I own a personal
computer,

the security is ok, by means that I make sure my fire wall is turned
on,

the protection against the spam m
ails or spam subject will be
block.
I would
buy

an

all
-
in
-
one security of desktop and internet
security,

although it is expensive but if this is the means
that my personal computer and files that was stored in it will be protected against fraud and
viruses
,

I will not think twice to buy
it.

Also it is foe my own safety also as a computer user. And it is my job to keep my personal
computer and files are secured and my security software
is

up to date to
protect.


3.)

If you use a computer system that is run by
an organization (a university or a corporation0,
have you ever carefully read the security policies that you are supposed to know as a system
user?


At this point of
time,

yes I read the security and policies that as a user of the computer of an
university

or a corporation, because they have different security measure that they do and us as
a user should obey and follow the rules and regulations that the institution have made to be
follow for it will not create a chaos and problems that will arise. By this
means the institution is
launching and giving the direction for the users to read and to follow.

Also as a user of the computer we have our
responsibility neither to

know the security policies
that we should
,

because it is our responsibility as a user

nor

not just to know but to be aware of
it
. T
hat the computer system is secure so the user will not think that they will do some foolish
act that will
harm the computer.


4.)

If your machine is being used as a drone by a hacker to send spam e
-
mails, are you a
victim, a
perpetrator, or both?


It’s a both , a victim and a perpetrator.
A victim because my personal machine was invaded and
used by another user to do some unwanted things by me and being control by the third party. A
perpetrator because, we have a res
ponsibility that we should secure our personal computers or
files.

5.)

If you make a living by selling security software to individuals who own personal computers,
are you happy or sad when hacker activity increases?


If I am making a living for selling inter
net security software to individuals who own a personal
computers, technically I’m happy that the activity of hackers increases because the margin of
my sales and demand will go higher and at this point since I’m selling the product that the
consumers want
s to buy and it is needed I can control my price due to the demands of the
individuals.


6.)

Have you ever receive an e
-
mail that indicates someone else had sent you spam without your
return e
-
mail address on it? How would you feel about that?


Yes, I have an

experience receiving an e
-
mail that indicates someone else had sent me a spam
without me returning e
-
mail address on it. I feel that my computer and my e
-
mail server is not
safe because stranger can break through.


7.)

Have you ever compromised physical
security for convenience? If so, what did you do? If not,
have you seen anyone else do this?


No , I didn’t tried a compromised physical security for convenience. I didn’t see anyone has do
this kind of stuff.


8.)

Why is the issue of children being exposed to

pornography online a difficult one to resolve? Is
this the only reason, in your opinion, that this issue has received so much publicity?


The child pornography online a difficult to
resolve,

the
re are some present reason.

1.)

Family problem, no one can teach
the child what to do and not to do. Also its affecting the
relationship with parents and child.

2.)

Insisted by circle of friends.

3.)

Experimental.

4.)

Money matters, some of the children think that this is the best way to earn money that will
support and sustain the

family needs.

5.)

The internet café/ establishment are not too strict to block the sites and allow minors to
engage with.

6.)

The peer pressure from the friends.

7.)

Experimental experience





9.)

Do you think that the 9/11 terrorist attack have substantially change peo
ple’s attitudes
toward the trade
-
offs between privacy and security? Do you think that the current tradeoffs,
as embodied in legislation, are appropriate?


Yes, the 9/11 terrorist attack have a big impact on people’s attitudes towards the trade
-
offs in
the
security and the privacy of each individuals. I don’t think the current trade off will be
appropriate, things change in a matter of short time so the legislation should somehow coup up
with the gap that can really protect every citizen.


10.)


Go on the Web an
d find a website that is fully accessible to the general public online (e.g., it
cannot be password protected) and contains material that you personally find offensive (for
this excursive, the more offensive to you, the “better”). Having viewed this materi
al from the
Web? If not, why not? If so, how would you envision the law would be enforced?