Skip to main content

Computer Security, Law Enforcement Officials, and Personal Privacy Issues


Computer security system is an effort made to secure the performance and computer processes.
The application of computer security in daily life is useful as a guardian of system resources so that it is not used, modification of interruptions and is disturbed by unauthorized people.
There are benefits from the use of a computer security system that is maintaining a computer system from accessing someone who does not have the right to access the computer system. Computer security systems are increasingly needed today along with the increasing use of computers throughout the world.

Factor of computer crime  



Some things that make computer crime continue to occur and tend to increase are as follows:
Increased use of computers and the internet, the amount of software that was initially used to audit a system by looking for weaknesses and loopholes that might be misused to scan other people's systems, the amount of software to infiltrate available on the Internet and can be downloaded for free Increased ability of computer and internet users, Lack of laws governing computer crime.

Law No. 11 of 2008, Information and Electronic Transactions

30
(1) Everyone intentionally and without rights or against
law accessing Computers and / or Electronic Systems
belongs to People other ways.
(2) Everyone intentionally and without rights or against the law
accessing Computers and / or Electronic Systems in any way for the
purpose of obtain Electronic Information
and / or Electronic Documents.
(3) Everyone intentionally and without rights or against
law accessing Computers and / or Electronic Systems
with any way by breaking, breaking through,
beyond, or break down the security system.

31
Everyone intentionally and without rights or
fight the law do interception or tapping for Electronic Information
and / or Electronic Documents in a certain Computer and / or
Electronic System belonging to another Person

Many people assume that information security problems can be solved by buying security products, such as firewalls, anti-viruses, etc., information security is actually something we will secure called "assets". For this reason, the first step in security is to determine the assets you want to protect, namely personal information. Privacy is still a foreign concept for many online service users, although this term is often the subject of discussion. Awareness of privacy also relates to freedom of expression and security issues. The attitude of not caring and assuming that privacy is not something important can be based on ignorance of threats and risks to one's privacy.
It can be concluded that most people are aware of the importance of privacy security in public services, some people are also aware of the risks that can occur if they violate other people's privacy policies. But not a few people who do not care about their privacy. Therefore, there needs to be a wider socialization and introduction to information security and privacy policies among students and in the community.

Andi Nurrahmi Mukaddas Praja Putri Cantika
                     106218043


Comments

Popular posts from this blog

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

What Is E-COMMERCE

Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions. Ecommerce is often used to refer to the sale of physical products online, but it can also describe any kind of commercial transaction that is facilitated through the internet. The history of ecommerce begins with the first ever online sale: on the August 11, 1994 a man sold a CD by the band Sting to his friend through his website NetMarket, an American retail platform. This is the first example of a consumer purchasing a product from a business through the World Wide Web or “ecommerce” as we commonly know it today. Ecommerce enables you to buy and sell products on a global scale, twenty-four hours a day without incurring the same overheads as you would with running a brick and mortar store. For the best marketing mix and the best conversion rate, an Ecommerce venture should al...