Computer ethics

               


                        Computer to steal


                              Introduction

    

Computer stealing is a ethic principle that covers the part of individuals using and breaking and   of another online user, such using the base, emails, bank account details, therefore can be considered as a crime. Based on those ideas regulations and recommendations have been approved, in the UK the legislation and regulation concern about date protection have been addressed since late1960, which enrolled late on the 1984 the data protection Act. Due to the any changes all over the time the low was enough to stop the cyber-crime, addition action has to be implemented support companies and personals, therefore the most important about protection would be the detention set the technologies to secure data, account and protect against cyber-attacks. 



Main body



      Due the rapidly devolvement of the technology and the cyber interactions, worldwide, the internet gain more users, whether is for business, leisure, money transition or even date relation, the internet can become a such a dangerous, when comes to introduce a personal data in any platform, therefore manger communication of integration and implement been a good way to support he law and protect users. 




 

 
Internet security and privacy 

  

 Internet Security and privacy they walk together, to avoid personal data been used for by a criminals, a effective infrastructure of security must be build up , to ensure that personal information will keep private and secure, however many technologies has been development target to personal information keep safe. The implementation of the Privacy enhancing technologies (PET) and virtual private Network (VPN), raising the level of trust between the business companies, also some other enhancing have been develop and implement across the cyber world such; transport Layer Security (TLS),DNS Security Extensions (DNSSEC), Onion Routing and Private Information Retrieval Private Information Retrieval (PIR). The data protection will be beneficial for a big companies and also for small a small companies witch are cover by the Act 2018.

 
-


Internet banking 

  

The internet has been suffering many changes in our days, the security is in fact more common action to be taking keeping safe bank account individuals secure, the aims is to assist and enhance a good and operational detention of the threat keeping confidentiality, integrity and private of the customers, main in internet banking due the impacts that those have  and implement been a good way to support he law and protect users. So is really important that in internet baking have been created implementation of a good framework witch cares of a high level of authentication and trust between individual, institutions and business companies basing in transactions, therefore have to been focus in high standard of security as the risks are very high.







        Cyber attack

    In our days , talking about cyber attack, is the some that talking about the high level of network crimes, cyber attack can be described as the high level of cyber crimes  witch can led in disable a single or various number of  computers, launch malicious(malware) or use breached computers as point of attack, stealing data and some of the cases preparing for an additional attack. An check point research mention that in Russia /Ukraine war after the third day was launched 196% of cyber attack to Ukraine Government, so as Jamal Raiyn mention that, "the Cyber attacks are actions that attempt to bypass security mechanisms of computer systems"(Survey attack detention 2014). 
    The focus is secure the threads in different areas however new more security protection are require to protect the private life of network worldwide. So is important that the possible cyber attack is identify or detain.
 Jamal Raiyn advice  that," To save innocent people life we suggest to set ethical rules for virtual world according to real life"(Survey attack detention2014). So cyber attack as action that target over take the mechanism of security of computer systems as;
  •   confidentiality
  •   Authentication 
  •   Detention
  •   Integrity
  •   Availability
     As a result of  detain the thread  will be the result of implement of a new computer security afford , aim a  possible a current tread in cyber attack detention system.



   Conclusion  

 
 

Network security has brought to our society, a quick development and attractive area of interesting, LANs, was the result of the rapidly develop when comes to protection and prevention securing the access in the flexible way, in a sort time of all information. When we take into consideration the fact of security builders providing confidentiality, integrity, authentication, it is meaning different and distant focus into the features of the Network security policy. 

    Another point that we must give relevance, is the fact in security, issues are raised by using efficient technology, therefore is fundamental that the features are update regularly (find out the risks and vulnerabilities, improvement of the security, rising questions about legislative, legal, social, technical, and ethical such between privacy and security).   Accordioning with International Conference on Computational Intelligence and Security (2017) they mention that the relevance for securing the network will most of the time be based on computer intrusion detention, traffic analysis and Network Motoring.  

 
 

 
 










 
 

 
 

 

Comments