BLOG #5


1. Do you think the Data Privacy Act of 2012 does not violate our freedom of speech and freedom of expression? Explain your answer. 

I think Data Privacy act of 2012 does not violet our freedom of speech and freedom of expression because data privacy act only dealing with the proper security handling of data concerning consent, notice, sensitivity, and regulatory concerns. Practical data privacy problems often revolve around.

Among the rights of a Data Subject, which do you consider as the two (2) most important rights? Why? Elaborate your answer. 

The most important data subject I consider is Right to be informed and Right to Erasure or Blocking

I consider this Right because the person must be immediately informed, meaning at the time the data is obtained. In terms of content, the controller’s obligation to inform includes his identity, the contact data of the Data Protection, the processing purposes and the legal basis, any legitimate interests pursued, the recipients when transmitting personal data, and any intention to transfer personal data to others. In addition, the right to be informed also includes the right to complaint with the authorities and whether the provision of personal data is required.

Right to Erasure or Blocking under the law, you have the right to suspend, withdraw or order the blocking, removal or destruction of your personal data. You can exercise this right upon discovery and substantial proof if Your personal data is incomplete, outdated, false, or unlawfully obtained or it is being used for purposes you did not authorize, the data is no longer necessary for the purposes for which they were collected and you decided to withdraw consent, or you object to its processing and there is no overriding legal ground for its processing.


 In Data Privacy Act of 2012, when do you consider a person as a Data Subject? Provide an example situation.

I consider a person as a Data Subject those people whose personal information are collected, stored and processed are called data subjects. they are accorded certain rights which they may invoke and enforce against personal information controllers or processors, and which the latter are duty-bound to observe and respect. In the event that a data subject feels that their personal information has been misused, maliciously disclosed, or improperly disposed, or that any of the rights discussed in this brochure have been violated, the data subject has a right to file a complaint with the National Privacy Commission.

PH-CYBERCRIME PREVENTION ACT OF 2012

What is Republic Act no. 10175?

AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES.

How many chapters does it contain?  Enumerate each chapter with its corresponding title.

It contains 8 chapters with corresponding  title.

CHAPTER I- PRELIMINARY PROVISIONS

CHAPTER II- PUNISHABLE ACTS

CHAPTER III- PENALTIES

CHAPTER IV- ENFORCEMENT AND IMPLEMENTATION

CHAPTER V- JURISDICTION

CHAPTER VI- INTERNATIONAL COOPERATION

CHAPTER VII- COMPETENT AUTHORITIES

What does Chapter 1 section 1 of RA 10175 contains?

SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012”.

What is the declaration policy of RA 10175?

The State perceives the indispensable job of data and interchanges ventures, for example, content generation, media communications, broadcasting electronic trade, and information preparing, in the country’s general social and monetary advancement. The State additionally perceives the significance of giving a situation helpful for the improvement, quickening, and objective application and misuse of data and interchanges innovation (ICT) to accomplish free, simple, and understandable access to trade as well as conveyance of data; and the need to secure and shield the respectability of PC, PC and correspondences frameworks, systems, and databases, and the classification, honesty, and accessibility of data and information put away in that, from all types of abuse, misuse, and unlawful access by making culpable under the law such lead or directs. In this light, the State will embrace adequate forces to successfully anticipate and battle such offenses by encouraging their recognition, examination, and indictment at both the household and universal dimensions, and by giving courses of action to quick and dependable worldwide collaboration.

What are the punishable acts of RA 10175?

  • Illegal Access. – The access to the whole or any part of a computer system without right.
  • Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  • Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
  • System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
  • Misuse of Devices.
  • Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such a domain name is:

If found guilty, what are the penalties?

Any individual discovered blameworthy of any of the culpable demonstrations counted in Sections 4(a) and 4(b) of this Act will be rebuffed with detainment of prision city hall leader or a fine of something like Two hundred thousand pesos (PhP200,000.00) up to a most extreme sum proportionate to the harm brought about or both.

Any individual discovered liable of the culpable demonstration under Section 4(a)(5) will be rebuffed with detainment of prision civic chairman or a fine of not in excess of Five hundred thousand pesos (PhP500,000.00) or both.

In the event that culpable demonstrations in Section 4(a) are submitted against basic foundation, the punishment of hermitic lifestyle fleeting or a fine of somewhere around Five hundred thousand pesos (PhP500,000.00) up to most extreme sum comparable to the harm brought about or both, will be forced.

Any individual discovered blameworthy of any of the culpable demonstrations identified in Section 4(c)(1) of this Act will be rebuffed with detainment of prision city hall leader or a fine of something like Two hundred thousand pesos (PhP200,000.00) yet not surpassing One million pesos (PhP1,000,000.00) or both.

Any individual discovered liable of any of the culpable demonstrations identified in Section 4(c)(2) of this Act will be rebuffed with the punishments as listed in Republic Act No. 9775 or the “Counter Child Pornography Act of 2009”: Provided, That the punishment to be forced will be one (1) degree higher than that accommodated in Republic Act No. 9775, whenever submitted through a PC framework.

Any individual discovered liable of any of the culpable demonstrations listed in Section 4(c)(3) will be rebuffed with detainment of arresto city hall leader or a fine of no less than Fifty thousand pesos (PhP50,000.00) yet not surpassing Two hundred fifty thousand pesos (PhP250,000.00) or both.

Any individual discovered blameworthy of any of the culpable demonstrations identified in Section 5 will be rebuffed with detainment one (1) degree lower than that of the recommended punishment for the offense or a fine of no less than One hundred thousand pesos (PhP100,000.00) however not surpassing Five hundred thousand pesos (PhP500,000.00) or both.

Do you think RA 10175 is enough to protect the country and the citizens against various cybercrimes? Justify your answer  (minimum of 100 words).

I think RA 10175 is enough to protect the country and the citizens against various cybercrime . why ? its because RA 10175 is the act of defending cybercrime  so when we say defending its means protection. The RA 10175 need to protect innocent citizens and business people from cybercrime and cyber bullying. Creating a law for that purpose is a step in the right direction.  A different version of that law may have the potential to protect the average citizen, but not in its current state, which supports the steps the Philippines government has taken to fight cybercrime.

Blog #2

Do a research on the top 10 most notorious hackers in the world. You may put a picture on each one you find with the same specifications. (please put references before starting item #2.)

This people are the most notorious hacker in the world.

Gary McKinnon

1. Gary McKinnon

must’ve been an inquisitive, anxious kid, for to pick up data on UFOs, he thought it better to get an immediate access into the channels of NASA. He penetrated 97 US military and NASA PCs, by introducing infection and erasing a couple of records. Every one of the endeavors to fulfill his interest, at the same time, oh dear, snooping around can lead to unexpected trouble.

LulzSec or Lulz

2. LulzSec or Lulz

Security, a prominent, Black Hat programmer gathering, picked up qualifications for hacking into Sony, News International, CIA, FBI, Scotland Yard, and a few significant records. So famous was the gathering that when it hacked into News Corporations account, they put over a bogus report of Rupert Murdoch having passed away.

 Adrian Lamo

3. Adrian Lamo

chosen to switch vocations when he understood the possibilities of his aptitudes. He turned into a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, in spite of the fact that finished into his capture, it later helped him gain the group of an American Threat Analyst. A person who would hack into choice records sitting in the roomy and consoling cafeterias, libraries, web bistros, before long turned Wikileaks suspect Bradley Manning over to FBI.

Mathew Bevan and Richard Pryce

4. Mathew Bevan and Richard Pryce

Focusing on the over-touchy nerves, what Mathew Bevan alongside his supposed accomplice Richard Pryce did, could have activated extraordinary numerous issues among USA and North Korea. The pair hacked the US military PCs and utilized it as a way to invade the remote frameworks. The essential substance of Korean Atomic Research Institute were dumped into USAF framework.

Jonathan James.gif

5. Jonathan James

The primary adolescent to be detained for a digital wrongdoing at 16 years old, Jonathan James or also called c0mrade, hacked into Defense Threat Reduction Agency of US division. Further, he introduced a sniffer that investigated the messages passed on between the DTRA workers. In addition to the fact that he kept a mind the messages being passed around, all the while, he gathered the passwords and usernames and other such crucial subtleties of the representatives, and further even stole fundamental programming.

Kevin Poulsen

6. Kevin Poulsen

      Poulsen invaded a radio shows bring in challenge to make sure he could win a Porsche. Dim Dante, as he was better known, went underground after FBI began seeking after him. He, later, was discovered liable of seven tallies of mail, wire and PC misrepresentation, tax evasion and the preferences. What ended up being remunerating in Dark Dante’s case is – his past created his future. Poulsen now fills in as a Senior Editor at Wired.

Kevin Mitnick

7. Kevin Mitnick

Kevin, who is currently a security advisor, was sentenced for hacking Nokia, Motorola and Pentagon. He conceded to seven checks of misrepresentation that included wire extortion, PC misrepresentation and of unlawfully capture a wire correspondence.

Binary Hacker Anonymous Internet Attack Mask One

8. Anonymous

The idea of being an “advanced Robin Hood” was a long way from being imagined, however in the PC age, all things considered, somebody some place has packed away this title. A “hacktivist gathering” called Anonymous are known with the penname of being the “computerized Robin Hood” among its supporters.

Astra-11.jpg

9. Astra

A 58-year-old Greek Mathematician hacked into the frameworks of France’s Dassault Group, stole helpless weapons innovation information and sold it to various nations for five long years. While the genuine character of the ASTRA remains untraced, authorities have said that he had been needed since 2002. Astra sold the information to roughly 250 individuals from around the world, which cost Dassault $360 a huge number of harm.

albert gonzalez.jpg

10 Albert Gonzalez

Stole from Visas of the netizens. This was recorded to be the greatest charge card burglary ever of. He exchanged roughly 170 million Visas and ATM numbers. He did as such by introducing a sniffer and sniffing out the PC information from inside corporate systems. Whenever captured, Gonzalez was condemned to 20 years in Federal jail

https://thoughtcatalog.com/siddhi-palande/2014/06/10-best-hackers-the-world-has-ever-known/

2. Explain why the cost to identify and remove a defect in the early stages of software development might be 100 times less than the cost of removing a defect in the software that has been distributed to hundreds of costumers.

In the event that the expense isn’t distinguished in the beginning times, some improve of the expectations produced in the former stages must be finished. Additionally, the later the mistake is discovered, the more people are influenced by the blunder. At late stages, it will cost cash to impart the details of an imperfection, convey and apply programming fixes, retrain end-clients for an item that has been sold to many clients.

https://www.coursehero.com/file/15135990/9507-3-Discussion-Sheet/

3. Identify the three criteria you can consider to be most important in a quality system. Briefly discuss your rationale for selecting these criteria.

Security

is a critical issue on programming advancement, particularly for web or versatile based ones which may have a large number of clients with the capacity of remote getting to framework. You should develop a security arrangement and apply it effectively by leaving no section focuses. This may incorporate approval and confirmation methods, organize assault insurances, information encryption, etc. every single conceivable sort of security holes ought to be considered, else one day just a single assault may crash your entire applicaion and entire organization.

Functionality and Correctness

Functionality (or correctness) is the conformity of the software program with actual requirements and specifications. In fact this is the precendition attribute of an application, and maybe no longer a great aspect however we desired to factor that as the ultimate first-rate factor, for taking attention: Quality elements are not significant when we are speaking about unfunctional software. First, perform desired performance and produce right software, then observe quality elements on it. If you can perform both paralelly, it is the best.

Maintainability and Readability

Maintainability is a touch similar with flexibility but it makes a speciality of changes about mistakes corrections and minor characteristic adjustments, not most important functional extensibilities. it could be supported with useful interface definitions, documentation, and self-documenting code and/or code documentation. The more correct and beneficial documentation exists, the extra maintainability can be carried out.

https://dzone.com/articles/10-groups-software-quality

Software Common Problem

Blog #3
  1. Look for two (2) companies experiencing the problem because of an error in the software they are currently using or because of a software upgrade.

Patriot Missile Error


Patriot Missile Defense: Software Problem Led to System Failure at Dhahran, Saudi Arabia
 reported on the cause of the failure

February 11, 1991, the Israeli powers illuminate the Patriot Project Office about an imperfection found in the Patriot surface-to-air rocket barrier framework. They found that running the framework for back to back 8 hours brought about a 20% focusing on exactness misfortune, and evaluated that after nonstop task for 20 hours the incorrectness would develop so huge that the Patriot would never have again the capacity to bolt on, track, and capture ballistic rockets. The U.S. commandants underestimated the significance of the revelation, assuming that the framework could never be utilized for more than 8 hours as it had been planned as a versatile framework to be utilized for brief time defense activities. A bug settle is issued, however applying it to each unit requires some time because of the continuous war, ballistic rocket R-17 (otherwise called Scud) strikes a U.S. Armed force sleeping shelter in Dhahran, Saudi Arabia, murdering 28 and harming 96 warriors.  The Patriot battery failed to intercept the missile due to a software error.

The Mariner 1 Spacecraft


Mariner 1 probe heading toward Venus had to be destroyed after veering off course due to equipment failure and an error in coded computer instructions.

Defective use of directions made guiding unimaginable, and was coordinating the rocket toward an accident, perhaps in the North Atlantic delivery paths or in an occupied territory. Ill-advised activity of the Atlas airborne reference point hardware caused different time frames without a rate flag. The post-flight audit likewise demonstrated that a missing hyphen in coded PC directions in the information altering program permitted transmission of inaccurate direction signals. At the point when the airborne reference point wasn’t working, the code mistake made the PC acknowledge the scope recurrence of the ground recipient as it looked for the vehicle signal flag and consolidated that with following information sent to the direction calculation. That prompted superfluous course revisions with inaccurate controlling directions.Do a research of two (2) companies specializing in creating various types of software. What software engineering principles and/or software development method are they following?

2. Do a research of two (2) companies specializing in creating various types of software. What software engineering principles and/or software development method are they following?

Itransition


Itransition Group Ltd. offers custom solution development, including Microsoft software product customization and integration. Document

Was established in 1998 and has developed to serve in excess of 500 customers and accomplices in 30 nations. They have workplaces in Austin, USA, London, UK and Minsk, Belarus. Their group of in excess of 1300 representatives is specialists at conveying full-cycle programming advancement administrations with great innovation abilities, area information, hands-on understanding and powerful philosophy. Itransition exceeds expectations being developed, customization and incorporation of complex venture level arrangements, propelled web and versatile applications. Itransition utilizes smart communication to collaborate efficiently, regardless of where you are based. Their principles likewise incorporate creativity, polished skill, social cooperation and obvious data. They don’t make suppositions with their work, and their undertakings and best practices are upheld up with actualities and hard information.

MentorMate


MotorMate is designed to fit snugly to most Evinrude, Johnson, Mercury and Yamaha outboard motors for the very best trailering support.

A versatile advancement pioneer built up in 2001. It started as an imaginative application for dialect teachers and has developed into a global versatile arrangements firm with very nearly 300 workers gaining practical experience in client encounter (UX), application advancement, innovation the executives and computerized promoting. Their central goal is “to drive portable business by structuring from the client’s point of view.” Their devoted groups of web and versatile application engineers can be scaled to suit any size and need. MentorMate’s counseling administrations are centered around the portable venture and can enable organizations to build up the 10,000 foot view and put resources into territories of chance. The main concern is MetorMate’s tweaked advanced arrangements address customers’ issues and acquire results.

Software Development Services

  • ROI Analysis
  • Mobile Strategy Development
  • RFP Documentation
  • Roadmap Development
  • Feature Definition
  • Rapid Ideation
  • Prototyping
  • Usability Testing
  • Software Quality Assessment
  • App Store Optimization
  • Digital Marketing Audit
  • Marketing Website

3. What is capability maturity model integration (CCMI)? Provide at least 2 companies that are currently using this model.

The Capability Maturity Model Integration (CMMI) is a capacity development demonstrate created by the Software Engineering Institute, some portion of Carnegie Mellon University in Pittsburgh, USA. The CMMI chief is that “the nature of a framework or item is very affected by the procedure used to create and look after it”. CMMI can be utilized to manage process enhancement over a task, a division, or a whole association .The CMMI was produced by the Software Engineering Institute at Carnegie Mellon University as a procedure enhancement device for ventures, divisions or associations. The DoD and U.S. Government built up the CMMI, which is a typical necessity for DoD and U.S. Government programming improvement contracts. The CMMI is as of now managed by the CMMI Institute, which was obtained by the ISACA in 2016


Accenture LLP

Accenture is a worldwide administration counseling, innovation benefits and re-appropriating organization, with roughly 319,000 individuals serving customers in excess of 120 nations. Consolidating unparalleled experience, thorough capacities over all enterprises and business capacities, and broad research on the world’s best organizations, Accenture works together with customers to enable them to end up elite organizations and governments.


Accenture 161 N. Clark,Chicago, IL, 
United States, 60601 (312) 693-0161

ALSTOM Transport S.A

ALSTOM Transport Engineering Process Group (EPG) has supported since 1995 the ALSTOM interior process enhancement program in programming and framework designing and the executives territories. The EPG has built up a total arrangement of administrations and items (MODAL technique for S/W, MODAL SAFETY for System and S/W executing wellbeing capacities, and devoted instructional hub). ALSTOM approved assessors, individuals from ALSTOM Transport EPG, have driven in excess of 50 official appraisals (CBA IPI, SCE, and SCAMPI) and several non-official evaluations (CMM or CMMI based) in all ALSTOM auxiliaries found around the world.


48, rue Albert Dhalenne, SAINT OUEN, 
France, 93482 +33157061060

Information Security

1.Who is Mafiaboy? What crime did he commit? 

Mafiaboy is otherwise called Michael Calce is an Canadian IT security expert. In mid 2000, aged of 15 and the alias of Mafiaboy, Calce shut down the Yahoo, the Web’s best internet searcher at the time, for just about an hour with a denial of service attack.He additionally cut down the sites of CNN, Amazon, eBay and Dell. He wrote about in his book “Mafiaboy: A Portrait of the Hacker as a Young Man.”

Michael Calce, who went by the online name Mafiaboy when he launched a massive cyberattack at the age of 15, now works as a security consultant for companies trying to protect their online systems.

2. How did Mafiaboy performed the attack?

Mafiaboy was accused of conducting an attack against Cable News Network’s Web site. He is the first to face charges in the onslaught that hindered access to the World Wide Web si tesof Yahoo, eBay and E*Trade, among others, and forced hundreds of other big-name sites to shore up their defenses against an invisible and far-flung threat.

3. Who is Onel de Guzman? What crime did he commit?

            One lde Guzman is a Filipino student from AMA who turned into a suspect for releasing the “I Love You Virus” because of a thesis proposal he had submitted to his college which was rejected because it was unethical. Onel admitted that he may have accidentally spread the infection

4. How did Iloveyou Virus spread throughout the world? How much was the damage?

On May 4 2000, an email bearing the title ”I LOVE YOU” started springing up in PCs in Asia. It spreadby email, touching base with the title “ILOVEYOU” and a connection,”LOVE-LETTER-FOR-YOU.txt.vbs”. In the event that the connection was opened, a Visual Basic content was executed, and the PC was tainted. Numerous beneficiaries were tricked in light of the fact that Microsoft Windows hid the expansion of the record, and it was mixed up as a basic content document. As indicated by a few gauges, the ILOVEYOU infection caused $10 billion in harms number of exploited people maybe doesn’t clarify all the harm the infection made. With such a significant number of unfortunate casualties hit, many mail frameworks around the globe totally over-burden, Menke caused, “enormous lump of the organizations and governments to completely pound down to a stop.

5.Who is the suspect behind hacking the COMELEC website in 2016?

            The suspect of hacking the COMELEC is Paul Zulueta Biteng, He is 23 years old recently graduated in April 2016 from the Perpetual Help College of Manila. He is a Bachelor of Science in Information Technology degree holder and a worldwide network programmer who take part in virtual fighting in the web. He believed that he is a white hacker he breaks a system to test the website’s security and help to improve it.

6.What was the reason behind hacking?

           According to him the reason behind why he hacked the COMELECT is to expose the vulnerability of Comelect’s website into public.

7.What are the possible and most dangerous effect of Computer Viruses

            Some PC diseases are adjusted to hurt the PC by hurting programs, eradicating reports, or reformatting the hard drive. Others basically rehash themselves or surge a system with movement,making it difficult to play out any web action. Without a doubt, even less destructive PC contamination can in a general sense irritate your system’s execution, sapping PC memory and causing progressive PC crashes.

8.What is the differences between a hacker and a cracker?

            A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data. While the cracker is someone who breaks into someone’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site’s security system.

https://searchenterprisedesktop.techtarget.com/tip/The-difference-between-hackers-and-crackers

9.Different computer virus from a worm.

          The virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels. Viruses can range in severity from causing mildly annoying effects to damaging data or software and causing denial-of-service conditions. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program.When the host code is executed, the viral code is executed as well.  The worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them.

https://www.cisco.com/c/en/us/about/security-center/virus-differences.html

10. How can a system or website be protected against computer malware and hacking.

            To protect your computer to computer malware and hacking, first is to Install a firewall, the purpose of firewall is to protect your computer from hackers and viruses. Second, is to install antivirus software, this software is used to detect and prevent dangerous viruses from interfering your computer by searching your computer for signs of virus activity. The third one is Install anti-spyware because spyware attempts to monitor your behavior so that it can collect the personal information, reconfigure your computer or force unwanted pop-ups and advertising. The last one, is Install a spam blocker or filter in your email accounts this is the easiest ways to idedentify thieves to trick you. Be careful about opening attachments and downloading files from emails, you can reduce your risk of becoming a spam victim.

http://www.identitytheftkiller.com/secure-computer.php

No comments to show.