Monday 8 August 2011

Laws and Guidelines using the Internet

Two laws which the company will have to abide by:-

1. The Electronic Communications Act has been written specifically for the online world. In general the laws are the same as everyday laws including subjects such as libel, threatening, bullying, harassing, making racist remarks etc.

2. Everything on the Internet is considered electronic media or digital works. Those works are protected by copyright law even if they are transferred to hard copy by scanning and printing them out; or whether they are just copied and pasted digitally from one web site to another. Electronic mail (email) can't even be posted without the owner's consent.



http://www.legislation.gov.uk/ukpga/2000/7/notes/contents
http://www.bbc.co.uk/webwise/guides/internet-law
http://www.ehow.com/about_4826935_copyright-laws-internet.html






Safety and Security Precautions

1# Step: Install Anti-virus SoftwareAnti-virus software is designed to identify and destroy viruses that can harm your computer, destroy your data, or exploit vulnerabilities that give access to your accounts and personal data. Choose a good quality, anti-virus program such (Norton Security, Karspersky Security, or Webroot Security. Be careful when you download a program and make sure it is from a reputable site that you trust or go to the manufacturer's website. To be effective, update the anti-virus software regularly to get the latest virus definitions (best practice is to set it up for automatic updates-this way you will not forget and always will be protected). Schedule scans to run when you are not using the computer, because the resources it takes to run a scan can slow you down your system.

2# Step: Turn on the Firewall
A firewall protects your computer from Internet traffic entering in or information leaking out. You can use two firewalls (Hardware) and stack them up to increase the security level. Also the level of traffic allowed should be set to "recommended" or HIGH . There are software firewalls that can be also used such ZoneAlarm and Webroot Firewall, but while anti-virus software scans emails and files, a firewall acts as a guard dog, keeping your system safe from unauthorized entry. It also blocks communications to and from your computer. To ensure the highest protection, it's best to use both a firewall and anti-virus/spyware software.

3# Step: Install Anti-spyware Software
Spyware and adware can cause a variety of things like annoying pop-ups and browser crashes, the installation of unexpected toolbars or icons, redirects to inappropriate sites, keys that don't function, random error messages, browser freezing and sluggish performance. These types of malware are installed on your computer without your consent, and can monitor and in some cases control your computer. To lower the risk of infection, use anti-spyware and adware software such Norton Security, Karspersky Security or Webroot Security Essentials. Using two different programs will give broader security and coverage.


http://studentzone.roehampton.ac.uk/itservices/onlinethreats/index_new.html
http://knol.google.com/k/how-online-security-threats-can-damage-your-computer

Threats to security

Threats to Security

Viruses can arrive as file attachments via e-mail, as embedded files on a CD-DVD or USB, and as clickable graphics in an e-mail or web advertising. All computers are at risk, particularly if connected to a network. Once on your system, these files are difficult to detect and remove. Viruses are malicious-dangerous computer code, typically designed to damage, that often duplicate and infect your computer files and operating system (OS).

Malware is a generic term for spyware & adware and can be installed without the user ever knowing. If you visit a compromised website, open an email or install a program, it is possible for the Malware author to exploit your PC's operating system to enable remote access or software installation e.g. of pop-ups, Trojans, worms, viruses, file sharing servers and keyloggers.
Another use of a compromised PC is to use it as a fileserver to allow the storage and sharing of copyrighted and illegal material.
Malware can be used for Identity theft by the installation of keyloggers which record every key press and mouse action. This allows for username & passwords, bank details, HR data etc to be captured and relayed to a remote hacker for fraudulent uses. The Malware will cause the PC to slow down and may cause the PC to crash frequently resulting in reduced productivity and perhaps lost work. If left for to long it may result in a need for the PC to need re-formatting to remove all the damage that has been done to the systems files. This can be lengthy and would require a full back up of the PC.

Spyware

is a type of malicious software that installs itself on your computer without your informed consent and uses your computer to generate a profit for the software makers. Some Spyware tracks your use of the computer and reports it to the author for marketing purposes or worse. Other packages use your computer to access web sites with adverts, call premium call numbers or any number of other activities. Most people become aware of the existence of Spyware only when their PC has slowed down to a crawl, but it is in fact a very common problem.

http://studentzone.roehampton.ac.uk/itservices/onlinethreats/index_new.html
http://knol.google.com/k/how-online-security-threats-can-damage-your-computer