Skip to main content

Computer Security, Law Enforcement Officials, and Personal Privacy Issues


Computer security system is an effort made to secure the performance and computer processes.
The application of computer security in daily life is useful as a guardian of system resources so that it is not used, modification of interruptions and is disturbed by unauthorized people.
There are benefits from the use of a computer security system that is maintaining a computer system from accessing someone who does not have the right to access the computer system. Computer security systems are increasingly needed today along with the increasing use of computers throughout the world.

Factor of computer crime  



Some things that make computer crime continue to occur and tend to increase are as follows:
Increased use of computers and the internet, the amount of software that was initially used to audit a system by looking for weaknesses and loopholes that might be misused to scan other people's systems, the amount of software to infiltrate available on the Internet and can be downloaded for free Increased ability of computer and internet users, Lack of laws governing computer crime.

Law No. 11 of 2008, Information and Electronic Transactions

30
(1) Everyone intentionally and without rights or against
law accessing Computers and / or Electronic Systems
belongs to People other ways.
(2) Everyone intentionally and without rights or against the law
accessing Computers and / or Electronic Systems in any way for the
purpose of obtain Electronic Information
and / or Electronic Documents.
(3) Everyone intentionally and without rights or against
law accessing Computers and / or Electronic Systems
with any way by breaking, breaking through,
beyond, or break down the security system.

31
Everyone intentionally and without rights or
fight the law do interception or tapping for Electronic Information
and / or Electronic Documents in a certain Computer and / or
Electronic System belonging to another Person

Many people assume that information security problems can be solved by buying security products, such as firewalls, anti-viruses, etc., information security is actually something we will secure called "assets". For this reason, the first step in security is to determine the assets you want to protect, namely personal information. Privacy is still a foreign concept for many online service users, although this term is often the subject of discussion. Awareness of privacy also relates to freedom of expression and security issues. The attitude of not caring and assuming that privacy is not something important can be based on ignorance of threats and risks to one's privacy.
It can be concluded that most people are aware of the importance of privacy security in public services, some people are also aware of the risks that can occur if they violate other people's privacy policies. But not a few people who do not care about their privacy. Therefore, there needs to be a wider socialization and introduction to information security and privacy policies among students and in the community.

Andi Nurrahmi Mukaddas Praja Putri Cantika
                     106218043


Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...