Skip to main content

Computer Security, Law Enforcement Officials, and Personal Privacy Issues


Computer security system is an effort made to secure the performance and computer processes.
The application of computer security in daily life is useful as a guardian of system resources so that it is not used, modification of interruptions and is disturbed by unauthorized people.
There are benefits from the use of a computer security system that is maintaining a computer system from accessing someone who does not have the right to access the computer system. Computer security systems are increasingly needed today along with the increasing use of computers throughout the world.

Factor of computer crime  



Some things that make computer crime continue to occur and tend to increase are as follows:
Increased use of computers and the internet, the amount of software that was initially used to audit a system by looking for weaknesses and loopholes that might be misused to scan other people's systems, the amount of software to infiltrate available on the Internet and can be downloaded for free Increased ability of computer and internet users, Lack of laws governing computer crime.

Law No. 11 of 2008, Information and Electronic Transactions

30
(1) Everyone intentionally and without rights or against
law accessing Computers and / or Electronic Systems
belongs to People other ways.
(2) Everyone intentionally and without rights or against the law
accessing Computers and / or Electronic Systems in any way for the
purpose of obtain Electronic Information
and / or Electronic Documents.
(3) Everyone intentionally and without rights or against
law accessing Computers and / or Electronic Systems
with any way by breaking, breaking through,
beyond, or break down the security system.

31
Everyone intentionally and without rights or
fight the law do interception or tapping for Electronic Information
and / or Electronic Documents in a certain Computer and / or
Electronic System belonging to another Person

Many people assume that information security problems can be solved by buying security products, such as firewalls, anti-viruses, etc., information security is actually something we will secure called "assets". For this reason, the first step in security is to determine the assets you want to protect, namely personal information. Privacy is still a foreign concept for many online service users, although this term is often the subject of discussion. Awareness of privacy also relates to freedom of expression and security issues. The attitude of not caring and assuming that privacy is not something important can be based on ignorance of threats and risks to one's privacy.
It can be concluded that most people are aware of the importance of privacy security in public services, some people are also aware of the risks that can occur if they violate other people's privacy policies. But not a few people who do not care about their privacy. Therefore, there needs to be a wider socialization and introduction to information security and privacy policies among students and in the community.

Andi Nurrahmi Mukaddas Praja Putri Cantika
                     106218043


Comments

Popular posts from this blog

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

Categories and Types of Artificial Intelligence

AI has 2 categories namely weak or strong. Weak AI also known as narrow AI. Weak AI is an AI system designed and trained for certain tasks. Weak AI can be a virtual personal assistant, like Apple Siri, Amazon’s Alexa, and Google Home. While strong AI, also known as general artificial intelligence, is an AI system with general human cognitive abilities. When a special task is presented, a strong AI system can find its own solution without human intervention. S trong AI acts more like a brain. It does not classify, but uses clustering and association to process data. In short, it means there isn’t a set answer to your keywords.  Beside that, an assistant professor of integrative biology and computer science engineering at Michigan State University, Arend Hintze, categorizes AI into 4 types, ranging from existing AI systems to AI systems that are still in design. The categories are as follows: Reactive machine. An example is Deep Blue, the IBM chess program that defeated Garr...