it146bongcac.blogspot.com
Ethics for IT Professionals and Related Laws: March 2010
http://it146bongcac.blogspot.com/2010_03_01_archive.html
Ethics for IT Professionals and Related Laws. Monday, March 15, 2010. Types of viruses and their examples. Different Types of Computer Viruses. This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Examples include: Randex, CMJ, Meve, and MrKlunky. Examples of this virus include: Way, Trj.Reboot, Trivial.88.D. This type of virus aff...
it146bongcac.blogspot.com
Ethics for IT Professionals and Related Laws
http://it146bongcac.blogspot.com/2010/02/what-is-profession-profession-is.html
Ethics for IT Professionals and Related Laws. Thursday, February 4, 2010. A profession is a specific line of work - Like in the medical industry you could say the medical profession. The people in a profession typically have education that trains them in the field they choose. We cannot say that we are a professional if we have not a profession. A professional is a member of a vocation founded upon specialised educational training. Subscribe to: Post Comments (Atom). A profession is a specific li.
it146dominguez.blogspot.com
IT146 Ethics: → World of Ethics ←
http://it146dominguez.blogspot.com/2010/01/define-following.html
Tuesday, December 29, 2009. 65515; World of Ethics ←. Is a task and responsibility given to person who are capable of doing things professionally, and does not hinder his/her feelings on the job. Professional are people who can do things according on what they were ought, and they studied on their field. According to The Merriam- Webster’s Dictionary, “Professional is one that engages in activity professionally.”. Am I an IT Professional? What Certification would you like to achieve? Yes, it's tRue.h...
it146dominguez.blogspot.com
IT146 Ethics: Case studies: Computer Security Under Attacks
http://it146dominguez.blogspot.com/2010/01/case-studies-computer-security-under.html
Thursday, January 14, 2010. Case studies: Computer Security Under Attacks. Case 1: The Wake Country Transportation Fraud. Once the fraud was discovered, an audit was performed and the report is available at Summerford audit report. Case 2: Illegal Data Mining. Case 3: The Melissa Worm. The investigation was conducted by members of the New Jersey State Police High Technology Crime Unit, the Federal Bureau of Investigation (FBI), the Justice Department’s Computer Crime and Intellectual Property Secti...
it146bongcac.blogspot.com
Ethics for IT Professionals and Related Laws: February 2010
http://it146bongcac.blogspot.com/2010_02_01_archive.html
Ethics for IT Professionals and Related Laws. Thursday, February 4, 2010. Can I consider myself as an IT professional after I graduate? What are the benefits of joining (IT) professional organization? What might be some dis advantages in your discussions mention. There are some benefits of joining IT professional organizations one of them is the Greater Professeional Fiel Exposure: to pursue the IT skills and to continue enhancment of IT. Should an IT professional either be licensed or certified? The wor...
it146lumongtad.blogspot.com
IT146 - Ethics for IT Professionals & Related Laws: Monitoring Employee Internet Use: My own perspective.c",)
http://it146lumongtad.blogspot.com/2010/01/monitoring-employee-internet-use-my-own.html
IT146 - Ethics for IT Professionals and Related Laws. My insights about ethics and more! Friday, January 29, 2010. Monitoring Employee Internet Use: My own perspective.c",). I have read an article written by Erwin A. Alampay, Ph.D., Regina Hechanova of Philippine Daily Inquirer about monitoring employee use of internet. Subscribe to: Post Comments (Atom). My dear cLasmates of all times -. Bongcac, Angel Lee. Gumondan, Mia Cress. Labrador, Xtine mae. Salinas, Jann Blair. Case Studies on Computer Attacks.
it146lumongtad.blogspot.com
IT146 - Ethics for IT Professionals & Related Laws: January 2010
http://it146lumongtad.blogspot.com/2010_01_01_archive.html
IT146 - Ethics for IT Professionals and Related Laws. My insights about ethics and more! Friday, January 29, 2010. Monitoring Employee Internet Use: My own perspective.c",). I have read an article written by Erwin A. Alampay, Ph.D., Regina Hechanova of Philippine Daily Inquirer about monitoring employee use of internet. Saturday, January 16, 2010. Case Studies on Computer Attacks. Case 1: Unauthorized Access at North Bay. Case 2: Denial of Service Attack. Case 3: Malicious Systems Admin at UBS. The owner...
it146dominguez.blogspot.com
IT146 Ethics: January 2010
http://it146dominguez.blogspot.com/2010_01_01_archive.html
Friday, January 29, 2010. 8734; What You Need to know.∞. The Ethics of Employee Monitoring. The Emergence of New Technology and Explosion of the Internet. To start with is “can technology change or influence our sense of values, morals, or ethics? 8221; The answer would be yes since technology can influence our actions and behaviors as it already has in many cases. Actions and behaviors, in turn, tend to form our values, ethics and ultimately our character. Employers’ Perspective on Monitoring. The owner...
it146dominguez.blogspot.com
IT146 Ethics: December 2009
http://it146dominguez.blogspot.com/2009_12_01_archive.html
Tuesday, December 29, 2009. 65515; World of Ethics ←. Is a task and responsibility given to person who are capable of doing things professionally, and does not hinder his/her feelings on the job. Professional are people who can do things according on what they were ought, and they studied on their field. According to The Merriam- Webster’s Dictionary, “Professional is one that engages in activity professionally.”. Am I an IT Professional? What Certification would you like to achieve? Yes, it's tRue.h...
it146dominguez.blogspot.com
IT146 Ethics: ↘ Types of Attacks ↙
http://it146dominguez.blogspot.com/2010/01/types-of-attacks.html
Thursday, January 14, 2010. 8600; Types of Attacks ↙. According to Information Security System, an attack. Is an intentional or intentional attempt to cause damage to or otherwise compromise the information and/or the systems that support it. If someone casually reads sensitive information not intended for his or her use, this is considered a passive attack. If hacker attempts to break into an information system, the attack is considered active. Ultimately all attacks are originated by people with a moti...