Computing Ethics

--Originally published at Computer and Information Security

Oh, hey reader! You are again here, it’s pretty cool that I keep getting your attention. This time I’m going to talk about the code of ethics in computing. Around the web there are a lot of documents, information and infographics that try to show what are those codes of ethics in computing, but  if you really want to know about computing stuff, you should always go to the official ACM (Association for Computing Machinery) web page, since this is the official organization that represents the computing community (Click here to get into the ACM web page).

As you know, all the present and future professions require a couple of rules of behaviour, like all humans do in society, in order to have a peaceful life and community, where we all look for each other like the good human beings we are. This means that by law we have to act with ethics and moral. In this case I’m going to show you the basic rules or behaviour, we, computing scientists or developers are forced to obey and accomplish, in order to have a good computer community:

1. PUBLIC – Software engineers shall act consistently with the public interest.

  • 1.01. Accept full responsibility for their own work.
  • 1.02. Moderate the interests of the software engineer, the employer, the client and the users with the public good.
  • 1.08. Be encouraged to volunteer professional skills to good causes and contribute to public education concerning the discipline.

2. CLIENT AND EMPLOYER – Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.

AIC Triad

--Originally published at Computer and Information Security

 

Hello reader! Is nice to know that you keep looking at my posts. This time I will talk about the AIC (Availability, Integrity and Confidentiality, some sites or information around the globe refers to this as CIA, yes like the Central of Intelligence Agency in the USA, but this has nothing to do with that).

Formally this is how most IT security practices are ruled, this three words are the fundamentals of security, let me explain to you what each one means:

  • Availability: Everything should be up and running, no matter what happens, the service or system should always respond.
  • Integrity: Nothing can be altered in terms of the information that is used in the service or system without detection.
  • Confidentiality: All information or data used should never be shared with third or unauthorized parties, since all of that is personal and literally confidential.

This three concepts are commonly applied into databases, since all information and data processing is stored by a company, so, you reader, are always in touch with this concepts everyday, because is possible that you use an app or something in the cloud that involves data sharing, text messaging or anything were you have to upload something to the network and read or download something from someone else, for example, whatsapp, e-mail, facebook, twitter and many more. Therefore, when you accept the privacy and security conditions (those little letters that pop up in a window where you click accept), you are accepting his own AIC rules, but obviously, they are regulated by a certification, they can’t fully change them for their benefit, because, this rules are made to benefit the user or customer. And that’s why you should always read this bunch of words in a small window.

Going back to the AIC Triad, if

Continue reading "AIC Triad"

Bloggin is coming!

--Originally published at Computer and Information Security

Howdy reader!

I Hope you are having a great day, because this has just started. I’m really excited to start this blog series about computer security, since I have always followed technology stories related with this topic but also because, nowadays the technology is revolutionzing  the way we live, it is becoming our second home (A digital home), I can make a lot of analogies between the real and digital world, but you get the idea. Being said that, security in the digital world is really important, since as there is bad people in the real life, there is in this new and big world of possbilites.

My interest in this topic began from a short story I will be sharing with you in the next post, this was like around 7-8 years ago, while I was still a computing geek child. With this story I hope you understand how important is to take in account security and try to learn everyday new stuff about this topic, to prevent catastrophic events, which could threaten your life.

So, go grab something to drink, eat and a couple of eye drops, because pretty good stories are coming, but also, pretty good articles about security.