Cryptography

In my opinion cryptography is one of the most interesting topics of the course and it is something that I already had a relationship with last semester in my subject of computational mathematics. My teacher explained some of the methods used and used for encryption of information and told us a lot about the Turing machine, which although used to solve algorithms was a key element in the Second World War to encrypt intercepted data . I could also see the Cesar cipher, used for a long time and actually very simple. Nowadays it is necessary to keep all information secure and cryptography must be essential to keep all the information we trust to the websites that we access safely.

In the semester, the school will provide important information about teachers and students and it is necessary to look for a tool that allows us to encrypt this data to keep them safe. As we will use NodeJS we will have to adapt a tool that allows us to use them and return the information as JsonWebTokenscrip

 

Security architecture and policies

The design of a computer security architecture helps to understand the risks to which the information of an organization is exposed, in order to establish the procedures that will help to eliminate them.

In my opinion you should have 3 essential criteria that are
Confidentiality Only authorized persons can access the data.

Integrity. The data must be authentic and can not be changed without permission.

Availability. Make the data available to the right person at the time you require it.

Risk management, and assessment

Everyday, all the time the information is exposed to be attacked for differents motifs, and this represent a lot of risks according the institute of software engineering of Carnegie Mellon risk is the possibility of suffering damages or losses for human agent or not.
The selection and specification of security controls for a system is accomplished as part of an organization that involves the management of organization risk and is a key element in the organization’s information security program and provides an effective framework for selecting the appropriate security controls for a system.

The Risk Management Framework provides a process that integrates security and risk management activities into the system development life cycle that utilice for prtotect the information.

Categorize,Select, Implement, Assess,Authorize,Monitor are paramount to an effective information security program and can be applied development life cycle.

WSQ2: Computing Ethics

ALBERTO————————-

Talk about ethics or moral in technology is a big challenge because we have a lot of ways to analyze, for example in our country Mexico, who is a crime? in base of Federal Penal Code article 7, crime is the act or omission that sanction criminal laws (Jimenez, ND). But in the technology area Mexico is growing because until 2013 the government of Peña Nieto modified some articles in the constitution to include topics about telecommunications like the access to internet, publications or opinions (Cuervo, 2014).

With this information, we find a topic that is controversial in the technologies, the information that we could share, copy, get or use because all new technologies give us access to lot of information like audios, movies, videos, articles, books, publications, etc. All information has an author or owner in consequence this information is not available to get free and we need to pay but people find methods to share information and break the law. One of the most recent and important examples is the history of Aaron Swartz where he downloaded illegally the JSTOR data base and was incriminate for several crimes like computer fraud, wire fraud, criminal forfeiture, etc and the interesting is that most of the charges were based on a law from 1986 and we don’t know is was justice or not.

We share information in many places and is our right but we need to know where is our limit and here is where the ethics are important because in our country is easy download or share file and could be in an illegally way is our decision if we do these actions or not.

 

Fernando——–

When it comes to talking about computer ethics is very complicated, because as a computer user some things that have some repercussions that can be harmful, when you turn on a computer that as a computer user you get a responsibility and we need to know how to use it in the best way. Talking about ethics is talking more about morality, but that depends on each person, considering whether their actions are good or not.

An issue that may violate computer ethics is the case of information privacy, sharing information without our knowledge, perhaps saying that that does not happen is totally false, because without thinking our personal information is being shared on the net in a countless sites that seek to offer us something, based on our tastes or previous searches.

the Big Brother of the 21st century is not on television if not on the internet, we do not read the terms and conditions of the Google contract we give permission to access and share our information with all its related. This information I remember an interesting documentary called «Google: behind the scene» I saw in my web development class, where Google as a company at first was only looking to improve as a search engine, but over the years all the information collected, have made continuous decisions about the information we provide. This makes us think if Google uses that information well or tries to monopolize it.

We use the internet every day and knowing if trusting if one of the largest companies on the internet ethically uses our data is a great incognita, we must know what personal information to give Google because it is no longer personal or confidential and many people can misuse of them. but we respect the privacy of information is the best to be an ethical computer user and improve the use of the internet

Authors:

J Alberto Hernandez E

Fernando Angel Medellin

Bibliography

Cuervo j (2014). Modificación del articulo 6 de la nostitución. Informatica Juridica. URL: http://www.informatica-juridica.com/anexos/modificacion-del-articulo-6o-de-la-constitucion-22-05-2013/

Jimenez J. (ND). Delitos informáticos en México. Revista Seguridad. UNAM. URL: https://revista.seguridad.unam.mx/numero26/delitos-inform-ticos-en-m-xico

  1. (2007, May 31). Google: Behind the Screen – (vpro backlight documentary – 2006). Retrieved September 09, 2017, from  https://www.youtube.com/watch?v=TBNDYggyesc

Security ACI

Since I was in high school I always believed that computer security was a very important part of the computer science, entering Tec de Monterrey always wanted to get to the subject of computer security. Well now is the time to know if this little curiosity that I have becomes complete in a future and as Bruce Schneier says develop that taste.
I have read several topics and articles about hackers and the tools they use for managing information, but I have not seen anything to put it into practice.
The finally having that matter and knowing the elements of AIC security I realize how solid this is, without these fundamentals and apply them during this semester i will be a challenge.
We will have to obtain data of the users, to create statistical data of the activities obtained within the application that we are going to realize.
It still sounds fairly simple in terms of security, but it will have to be polished and developed very in detail to expand it and make it better.