84 resultados para hacking


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A presentation going over the main legal issues people face in the IT industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A poster summarising the main legal issues people face in the IT industry.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As part of the INFO2009 coursework; an interactive resource set to teach students about the Computer Misuse Act, encompassing an explanation of the law and multiple-choice questions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content related to the second INFO2009 assignment for Group 6's radio interview on data security and the DPA

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Privacy is a concept that has been with us for hundreds of years, but it is relatively recently (the last 130 years or so) that it has been seen as something that needs protection as a legal right. Technology has presented many challenges to privacy, from the printing press to recording devices to communication hacking, but Social Media seems to present something new - a phenomenon of people giving up their personal information to an extent that would be considered extraordinary just a generation ago. In this lecture we look at attitudes and behaviors around privacy, see how social norms have shaped our expectations of privacy, and how we have come to trade our privacy for value, making complex (and sometimes ill-informed) risk decisions. We will also explore how people really behave on Social Media systems, to see whether we (as a society) should be concerned about modern attitudes to privacy, and whether there are any advantages that might balance that concern. Finally we look at how technology can be applied to the problems of privacy, both as a preventative measure, but also by aiding transparency and helping people to make better privacy decisions. These slides were updated for 2014.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is the INFO2009 project for group 17 Our topic is Security. Our resource is a website that contains links to different questionnaires we created to help educate people in various subtopics of Security

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presentation slides + mini quiz on the topic of cybercrime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Informative website about Anonymous/LulzSec and Denial of Service attacks

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is an educational resource that covers a number of realistic attacks on privacy from a technical perspective along with the legal issues you might face if you don't take adequate precautions with data. The format is engaging and entertaining, framing real-world issues in a familiar medium - namely that of a trailer for a blockbuster film.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introducción: La OMS revela que en 2010 alrededor de 43 millones de niños menores de 5 años presentan sobrepeso. En Colombia según la Encuesta Nacional de Situación Nutricional en Colombia en su versión 2005, mostraba una prevalencia general de sobrepeso de 3.1% niños de 0 a 4 años. Es una condición de salud de origen multifactorial en la que interviene factores genéticos, ambientales, maternos y perinatales. Objetivo: Establecer la asociación de riesgo entre el bajo peso al nacer y el desarrollo de sobrepeso y obesidad en niños de 4 a 5 años. Metodología: Se realizó un estudio observacional descriptivo retrospectivo de corte transversal con los datos nutricionales, maternos y perinatales de la Encuesta Nacional de Demografía en Salud del año 2010 en Colombia. Se analizó la asociación entre la variable independiente bajo peso al nacer con el desenlace sobrepeso y obesidad en menores de 4 a 5 años, usando como medida el IMC según la edad. Se realizaron análisis univariados, bivariados y de regresión logística con un modelo de riesgo según las variables que inciden en el desenlace y la variable independiente. Resultados: La muestra obtenida para el estudio fue de 2166 niños de 4 a 5 años de edad quienes cumplían los criterios de inclusión. La prevalencia de sobrepeso u obesidad en la primera infancia fue de 21.8% (472) y el bajo peso al nacer. Los resultados sugieren la asociación de bajo peso y sobrepeso u obesidad es de ORajustado= 0.560 (0.356 – 0.881). Conclusiones: Los resultados sugieren que existe una asociación como factor protector entre el bajo peso y el sobrepeso u obesidad en la primera infancia. Sin embargo, debido al comportamiento de las variables consideradas en la muestra no hay suficiente información para rechazar completamente la hipótesis nula.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El diagnóstico de cáncer ha sido asociado con un alto riesgo de presentar ideación suicida en comparación con la población no oncológica, sin embargo se ha considerado al apoyo social como un factor protector para la ocurrencia de esta conducta. La presente investigación tuvo como objetivo identificar la relación entre el apoyo social percibido y la ideación suicida en 90 pacientes oncológicos adultos en Bogotá, bajo la hipótesis de que a mayor apoyo social percibido, menor presencia de ideación suicida. Se midió la variable de apoyo social a través del cuestionario Duke UNC y la ideación suicida a través de cuatro instrumentos: Escala de Ideación Suicida (SSI), Escala de Desesperanza de Beck (BHS), el ítem 9 del Inventario de Depresión de Beck (BDI-IA) y una entrevista semiestructurada. Los resultados mostraron que no existe relación entre el apoyo social percibido y la ideación suicida. Por otro lado se identificó una prevalencia de suicidio entre 5,6% y 22,77%, confirmando que el paciente con cáncer considera el suicidio y es fundamental evaluar esta variable en esta población. Se considera importante continuar con la realización de investigaciones que permitan generalizar los resultados a la población oncológica colombiana.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.