Thursday, February 11, 2010

IT graduating students AIMs?

Question:

        As an IT graduating students of the College, what Certification or Licensing you are aiming for? Why?

Answer: 

  • Cisco Certified Entry Networking Technician (CCENT
  • Microsoft Certified Application Specialist (MCAS) 
  • CompTIA Security+ certification 
  • Microsoft Certified Professional Developer (MCPD) 
  • CompTIA A+ certification 
  • Certified Information Systems Security Professional 
  • CompTIA Network+ certification        

licensed or certified?

Question:

        Should an IT Professional either be licensed or certified? Why or why not? 

Answer: 



        Being certified will help IT professional to prove his capability and creditability for others as Microsoft said "How they know that you know?" but the most important then certificate is the experience, so I consider the certificate is a plus for IT not necessary

benefits of joining (IT) professional organizations

Question: 

     What are some benefits of joining (IT) professional organizations? What might be some disadvantages? In your discussions mention at least three (3) local or regional, two (2) national, and five (5) international IT professional organizations including their brief profile.

Answer: 


No matter what your chosen field of study, as a graduate student we want to remain in the mainstream of our desired field. Of course there are numerous ways that this could be accomplished - networking, trade and professional journals, etc. However, one great way to accomplish this is by joining a professional association. below are some benefits that I myself consider.

         For information technology professionals, the benefits of membership in professional organizations, whether national or local, should not be underestimated. The establishment of a professional community in the guise of professional organizations, where members can freely associate, develop relationships, and exchange ideas, transcends the more usual aspects of professional life to create common ground. As information technology moves from the province of the educated elite to the general consuming population, the importance of professional standards of ethics, education, and competence will greatly increase. Consumers and other nonprofessionals will require a certain known standard from those of us who develop and implement technological change. Like it or not, ready or not, information technology and the professionals who have taken the responsibility to implement it have become too vital to rely on chance. Professional organizations set the standards that increase confidence and reduce uncertainty.


 Association of Information Technology Professionals (AITP)
The Association of Information Technology Professionals was formed in the 1950s as a users’ group for the technically minded to keep ahead of the technological learning curve. Annual membership dues vary by regional chapter, but the average is around $120.

The organization’s mission is:

“…to provide superior leadership and education in Information Technology. AITP is dedicated to using the synergy of Information Technology partnerships to provide education and benefits to our members and to working with the industry to assist in the overall promotion and direction of Information Technology.” 


            The organization maintains a Code of Ethics for its members as well as Standards of Conduct. The emphasis is on the obligation members have toward management and the professional responsibility they have to achieve competence, skill, and knowledge. The AITP publishes a monthly newsletter, The Information Executive, which focuses on current industry topics with contributions from industry experts, practitioners, and educators. 

The Information Technology & Telecommunications Association (TCA)
The TCA was formed originally in 1961 to exchange information, ideas, and experiences in the telecommunications industry. Today, the TCA is comprised of diversified organizations, in regional chapters on an international scale.


The TCA’s mission:

“The Information Technology and Telecommunications Association is the resource for information technology and telecommunications professionals involved in transporting, connecting and integrating data, image, video and voice.”
Institute for Certification of Computing Professionals (ICCP)
Founded in 1973, the Institute for Certification of Computing Professionals is acknowledged throughout the information and technology sectors as an authoritative source of professional certification. The CCP examinations demand a high degree of professional competence. The tests are organized into 17 specialty exams ranging from Business Information Systems to RPG/400 Language.

The ICCP offers 2 professional designations:
  1. Certified Computing Professional (CCP)
  2. Associate Computing Professional (ACP)

Society of Information Technology Management (SocITM)
The Society of Information Technology Management was formed in 1985 with the main stated objective being to promote the effective and efficient use of Information Technology in Local Government and the Public Sector within the United Kingdom. Full Membership is open to officers directly employed by qualifying organizations in the public sector and who have a major influence within their authority on matters of IT strategy and/or IT policy and/or IT delivery functions. 





Monday, January 11, 2010

CRIMES AGAINST HONOR

Provissions that penalize the issue of Online Defamation
( Philippine Law )

Chapter One
LIBEL

Section One. — Definitions, forms, and punishment of this crime.

Art. 353. Definition of libel. — A libel is public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.
Art. 354. Requirement for publicity. — Every defamatory imputation is presumed to be malicious, even if it be true, if no good intention and justifiable motive for making it is shown, except in the following cases:
1. A private communication made by any person to another in the performance of any legal, moral or social duty; and
2. A fair and true report, made in good faith, without any comments or remarks, of any judicial, legislative or other official proceedings which are not of confidential nature, or of any statement, report or speech delivered in said proceedings, or of any other act performed by public officers in the exercise of their functions.
Art. 355. Libel means by writings or similar means. — A libel committed by means of writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any similar means, shall be punished by prision correccional in its minimum and medium periods or a fine ranging from 200 to 6,000 pesos, or both, in addition to the civil action which may be brought by the offended party.
Art. 356. Threatening to publish and offer to present such publication for a compensation. — The penalty of arresto mayor or a fine from 200 to 2,000 pesos, or both, shall be imposed upon any person who threatens another to publish a libel concerning him or the parents, spouse, child, or other members of the family of the latter or upon anyone who shall offer to prevent the publication of such libel for a compensation or money consideration.
Art. 357. Prohibited publication of acts referred to in the course of official proceedings. — The penalty of arresto mayor or a fine of from 20 to 2,000 pesos, or both, shall be imposed upon any reporter, editor or manager or a newspaper, daily or magazine, who shall publish facts connected with the private life of another and offensive to the honor, virtue and reputation of said person, even though said publication be made in connection with or under the pretext that it is necessary in the narration of any judicial or administrative proceedings wherein such facts have been mentioned.
Art. 358. Slander. — Oral defamation shall be punished by arresto mayor in its maximum period to prision correccional in its minimum period if it is of a serious and insulting nature; otherwise the penalty shall be arresto menor or a fine not exceeding 200 pesos.
Art. 359. Slander by deed. — The penalty of arresto mayor in its maximum period to prision correccional in its minimum period or a fine ranging from 200 to 1,000 pesos shall be imposed upon any person who shall perform any act not included and punished in this title, which shall cast dishonor, discredit or contempt upon another person. If said act is not of a serious nature, the penalty shall be arresto menor or a fine not exceeding 200 pesos.

Section Two. — General provisions

Art. 360. Persons responsible. — Any person who shall publish, exhibit, or cause the publication or exhibition of any defamation in writing or by similar means, shall be responsible for the same.
The author or editor of a book or pamphlet, or the editor or business manager of a daily newspaper, magazine or serial publication, shall be responsible for the defamations contained therein to the same extent as if he were the author thereof.
The criminal and civil action for damages in cases of written defamations as provided for in this chapter, shall be filed simultaneously or separately with the court of first instance of the province or city where the libelous article is printed and first published or where any of the offended parties actually resides at the time of the commission of the offense: Provided, however, That where one of the offended parties is a public officer whose office is in the City of Manila at the time of the commission of the offense, the action shall be filed in the Court of First Instance of the City of Manila, or of the city or province where the libelous article is printed and first published, and in case such public officer does not hold office in the City of Manila, the action shall be filed in the Court of First Instance of the province or city where he held office at the time of the commission of the offense or where the libelous article is printed and first published and in case one of the offended parties is a private individual, the action shall be filed in the Court of First Instance of the province or city where he actually resides at the time of the commission of the offense or where the libelous matter is printed and first published: Provided, further, That the civil action shall be filed in the same court where the criminal action is filed and vice versa: Provided, furthermore, That the court where the criminal action or civil action for damages is first filed, shall acquire jurisdiction to the exclusion of other courts: And, provided, finally, That this amendment shall not apply to cases of written defamations, the civil and/or criminal actions which have been filed in court at the time of the effectivity of this law.
Preliminary investigation of criminal action for written defamations as provided for in the chapter shall be conducted by the provincial or city fiscal of the province or city, or by the municipal court of the city or capital of the province where such action may be instituted in accordance with the provisions of this article.
No criminal action for defamation which consists in the imputation of a crime which cannot be prosecuted de oficio shall be brought except at the instance of and upon complaint expressly filed by the offended party.
(As amended by R.A. 1289, approved June 15, 1955, R.A. 4363, approved June 19, 1965).

Art. 361. Proof of the truth. — In every criminal prosecution for libel, the truth may be given in evidence to the court and if it appears that the matter charged as libelous is true, and, moreover, that it was published with good motives and for justifiable ends, the defendants shall be acquitted.
Proof of the truth of an imputation of an act or omission not constituting a crime shall not be admitted, unless the imputation shall have been made against Government employees with respect to facts related to the discharge of their official duties.
In such cases if the defendant proves the truth of the imputation made by him, he shall be acquitted.
Art. 362. Libelous remarks. — Libelous remarks or comments connected with the matter privileged under the provisions of Article 354, if made with malice, shall not exempt the author thereof nor the editor or managing editor of a newspaper from criminal liability.



Sunday, January 10, 2010

Online Defamation issue in the Philippines

We see the explosion of e-groups, blogs, message boards and other fora wherein people share facts, views and opinions. With respect to established institutions, particularly newspapers, the Online Journalism Review reports how the Washingtonpost.com made good use of the internet to expand the reach and revenue of its parent paper. Gauging from the number of advertisements in Inq7.net, the same may as well hold true in the Philippine setting.

The vast reach and infinite potential of the internet is beyond dispute. Indeed, the easy transfer of information over the internet on real time basis and through territorial jurisdictions has opened great possibilities, both in terms of opportunities and problems. If you consider the huge amount of content written about almost everyone in the internet, it will not be long before someone gets really pissed and files a case for libel. In fact, there are already pending cases.

In the Philippines, the multiple publication rule applies. It means that if a single defamatory statement is published several times, it gives rise to as many offenses as there are publications.

In Philippine jurisdiction, the truth is not always a defense. While something is true, if the purpose is to besmirch, then liability still exists. To be liable for libel, the following elements must be shown to exist: (1) the allegation of a discreditable act or condition concerning another; (2) publication of the charge; (3) identity of the person defamed; and (4) existence of malice.

As a rule, every defamatory imputation is presumed to be malicious, even if true, if no good intention and justifiable motive is shown (Art. 354, RPC). As an exception, the presumption of malice does not apply in privileged communication, which may be absolute or conditional.

Absolutely privileged communications is one wherein no liability, even if its author acted in bad faith. This class includes statements made by members of Congress in the discharge of their functions as such, official communications made by public officers in the performance of their duties, and allegations or statements made by the parties or their counsel in their pleadings or motions or during the hearing of judicial proceedings, as well as the answers given by witnesses in reply to questions propounded to them, in the course of said proceedings, provided that said allegations or statements are relevant to the issues, and the answers are responsive or pertinent to the questions propounded to said witnesses.

Conditionally or qualifiedly privileged communications are those which, although containing defamatory imputations, would not be actionable unless made with malice or bad faith. Conditionally or qualifiedly privileged communications are those mentioned in Article 354 of the RPC:

1. A private communication made by a person to another in the performance of any legal, moral, or social duty. The following requisites, however, must exist: (a) the person who made the communication had a legal, moral, or social duty to make the communication, or at least, had an interest to protect, which interest may either be his own or of the one to whom it is made; (b) the communication is addressed to an officer or a board, or superior, having some interest or duty in the matter, and who has the power to furnish the protection sought; and (c) the statements in the communication are made in good faith and without malice.

2. A fair and true report, made in good faith, without any comments or remarks, of any judicial, legislative, or other official proceedings which are not of confidential nature, or of any statement, report, or speech delivered in said proceedings, or of any act performed by public officers in the exercise of their functions.

The fact that a communication is privileged does not mean that it is not actionable; the privileged character of the communication simply does away with the presumption of malice, and the plaintiff has to prove the fact of malice in such case.

The elements of libel are present

Unfortunately for the respondent, the Investigating Prosecutor found that there is probable cause to charge him, together with the main respondent in the other complaint, with libel. The amount of bail is set at PhP10,000.00 each.

According to the Investigating Prosecutor, the following are the elements of libel:

1. the allegation of a discreditable act or condition concerning another;
2. publication of the charge;
3. identity of the person defamed; and
4. existence of malice.

An allegation made by a person against another is considered defamatory if it ascribes to the latter the commission of a crime; the possession of a vice or defect, whether real or imaginary; or any act, omission, condition, status or circumstance which tends to dishonor or discredit or put him in contempt, or which tends to blacken the memory of one who is dead.

Every defamatory imputation is presumed to be malicious, even if it is true, if no good intention and justifiable motive for making it is shown. Thus, where there is a defamatory imputation, proof of malice is not required as it is incumbent upon the author thereof to demonstrate that such is not malicious and that good intentions and justifiable motives attended the same.

There are, of course, exceptions to the foregoing. Absolutely privileged communications are not actionable. This class includes statements made by members of Congress in the discharge of their functions. Likewise exempted are private communications made by any person to another int he performance of any legal, moral or social duty and a fair and true report, made in good faith, without comments and remarks, of any judicial, legislative or other official proceedings. Furthermore, where statements relating to the conduct of public officials are involved, malice is not presumed.

In the libel complaints, the individual respondents never denied authorship of the comments, which are manifestly defamatory. Such being the case, it was incumbent upon the respondents to present proof that such are not malicious and that good intentions and justifiable motives attended the same. Apart from their self-serving denials, the respondents failed to present proof that the statements are indeed not as malicious as they appear or that the same were made with good intentions and/or justifiable motives.

In any case, due to the legal presumption of malice, a prima facie case for libel exists against the respondents and whatever defenses they may have in refutation of the same would be best ventilated in a court of law on the occasion of a full-blown trial.

Libel covers matters posted in the internet

One of the defenses raised by the respondent is that libel under the Revised Penal Code does not cover and regulate the internet. According to the Investigating Prosecutor, the crime of libel as defined and penalized under the Revised Penal Code is broad enough to cover “publication” of malicious and defamatory statements over the internet. Publication has been defined as the communication of the defamatory matter to some third person or persons and the internet is just one among the main media available to all and sundry nowadays for the communication and dissemination of thoughts, words and ideas.

One significant distinction, however, is to be made as to the scope and breadth of the statutory definition of the crime of libel with respect to the personalities who may be held liable for articles or comments made over the internet. Insofar as the worldwide web is concerned, we cannot apply the traditional concept of a publisher of a newspaper or periodical insofar as his/her liability for libel is concerned to all the actors involved in the setting up, ownership, and management or supervision of an internet site, web log (blog) or forum. This matter is discussed in detail below (referring the the part on Abe Olandres).


Wednesday, January 6, 2010

A case study on computer security for non-expert computer user

Computer security is a growing concern for many personal computer owners. Cyber crime has been on a constant rise. Many home computer owners don't realize that they need to pay attention to computer security very closely. This paper describes an investigation on both sides of a cyber attack. We measure the activities of a computer's inner workings while it is under attack. The intent is to reveal indications that an intrusion has occurred by showing events that occur when a personal computer user's password has been hacked. With this gained knowledge, a system can be put in place that can alert the user that his/her computer is under an attack. The main goal is to design a system that is easy for any novice computer user to use.

Types of attack

Ultimately all attacks are originated by people with a motivation to steal, cause vandalism, prove themselves to be elite hackers, or just for the thrill it gives them. Most attacks are actually performed by automated tools that such people release on the Internet.

  • Virus

Computer viruses have a long history. A virus attempts to install itself on a user's system and to spread directly to other files on that system with the aim that these infected files will be transferred to another machine. The payload of a virus can range from 'comical' pranks to destruction of the system itself.

A virus relies on users to spread by sharing infected files either directly or via email. Once launched, a virus is completely independent of its creator.

Although the most common threat to security, the traditional virus does not attack other systems directly and so is unlikely to be detected by KFSensor.

  • Worm

A worm is very similar to a virus. The key difference is that a worm attempts to propagate itself without any user involvement. It typically scans other computers for vulnerabilities which it is designed to exploit. When such a machine is identified, the worm will attack that machine, copying over its files and installing itself, so that the process can continue.

KFSensor excels at detecting worms as they scan and attempt to attack very large numbers of systems at random.

  • Trojan

Trojans take their name from the trojan horse of Greek mythology.
Computer trojans work in the same way. A game, screen saver or cracked piece of commercial software is given to a victim. The software may appear to work as normal, but its real purpose is to deliver a payload, such as a virus or a root kit.

  • Root Kit

A root kit is a piece of software that once installed on a victim's machine opens up a port to allow a hacker to communicate with it and take full control of the system. Root kits are also known as back doors. Some root kits give a hacker even more control of a machine than a victim may have themselves.

The SubSeven root kit allows an attacker to turn off a victim's monitor, move the mouse and even turn on an installed web cam and watch the victim without their knowledge.

  • Hybrids

Often malware is a dangerous hybrid that can combine the features of the different classifications described above. The SubSeven root kit is delivered and classified as a trojan.

Scanners are tools designed to interrogate machines on the Internet to elicit information about the types and versions of the services that they are running. There are a variety of scanners, some just ping for the presence of a machine, others look for open ports, while others are more specialized in looking for vulnerabilities of a particular type of service, or the presence of a root kit. Scanners are often incorporated into other malware such as worms.

Scanners are a favorite tool of a hacker, but are just as useful to security professionals trying to detect and close down system vulnerabilities. KFSensor detects scanners and is effective at misleading them.

  • Hacker

Hacker, H4x0r5, crackers and black hats are all terms for those individuals that KFSensor is ultimately designed to detect and offer protection from. The term hacker is used in this manual to cover all such individuals.

Direct or manual actions, by a hacker are much rarer than the attacks launched by the tools described above. Hackers usually only attack a system directly once a system has been identified as vulnerable or has already been exploited by an automated tool.