You are on page 1of 6

Privacy: the quality or condition of being secluded from the presence or view of others.

Various Definitions of a Large Database The definition of large database is always changing, as IT collects more data (e.g. click stream data) and as hardware and software evolve to handle larger amounts of data. What was large 10 years ago is tiny today. The term Large Database can be quantified by a variety of criteria, Small Database Fits in Memory No DBA Required <105 Records <10 GB of Data No Partitions Medium Database Fits in Single Server 1 DBA Required 105 107 Records 10GB 40GB of Data Minimal Partitions Large Database Spread Over Multiple Servers 2+ DBAs Required >107 Records >40GB of Data Massively Sharded Performance is a Problem!

--Performance is not a problem --

The Internet is changing the way we work, socialize, create and share information, and organize the flow of people, ideas, and things around the globe. Yet the magnitude of this transformation is still underappreciated. The Internet accounted for 21 percent of the GDP growth in mature economies over the past 5 years. In that time, we went from a few thousand students accessing Facebook to more than 800 million users around the world, including many leading firms, who regularly update their pages and share content. While large enterprises and national economies have reaped major benefits from this technological revolution, individual consumers and small, upstart entrepreneurs have been some of the greatest beneficiaries from the Internets

empowering influence. If Internet were a sector, it would have a greater weight in GDP than agriculture or utilities. The concept of Web 2.0 began with a conference brainstorming session between OReilly and MediaLive International. Dale Dougherty, Web pioneer and OReilly VP, noted that far from having crashed, the Web is more important than ever, with exciting new applications and sites popping up with surprising regularity. I dont think there was any deliberate plan to suggest there was a new version of the Web, or trying to define the latest technology gadgets. They just wanted to make the point that the Web mattered again. The Internet Identity Workshop, better known as IIW, is an un-conference that happens at the Computer History Museum, in the heart of Silicon Valley, every Spring and Fall. IIW has always had an identity focus, but the topics are chosen by participants so they can be anything. Here were just some of the issues we worked on at the last IIW, in May:

Identity Personal clouds Better social login Authentication (e.g. Oauth2) Data portability Mobility Surveillance Security Legal issues Business issues

Cultural and social issues Cool new and old devices Trust frameworks VRM (vendor relationship management) Government intiatives (e.g. NSTIC)

For many companies, collecting sensitive consumer and employee information is an essential part of doing business. It is your legal responsibility to take steps to properly secure or dispose of it. Financial data, personal information from children, and material derived from credit reports may raise additional compliance considerations. In addition, you may have legal responsibilities to victims of identity theft.

The Federal Trade Commission (FTC) regulates and oversees business privacy laws and policies that impact consumers. Check out the following guides from more information on how you can ensure you are compliant.

Security: the state of being free from danger or threat. Computer crime refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3] Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones

(SMS/MMS)".[4] Such crimes may threaten a nations security and financial health.[5] Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems ofprivacy when confidential information is lost or intercepted, lawfully or otherwise.

Virus: Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.

Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.[2] Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Greece, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.[1][2][3][4][5]
Ethics:

moral principles that govern a person's or group's behavior.

Copyright is a legal concept, enacted by most governments, that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to receive compensation for their work and be able to financially support themselves. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other related rights. It is a form of intellectual property (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete.[1]

Plagiarism: If you fail to acknowledge borrowed material, then you are plagiarizing. Plagiarism is literary theft. When you copy the words of another, be sure to put those words inside quotation marks and to acknowledge the source with a footnote [or, in our case, a citation]. When you paraphrase the words of another, use your own words and your own sentence structure, and be sure to give a footnote [citation] citing the source of the idea. A plagiarist often merely changes a

few words or rearranges the words in the source. As you take notes and as you write your paper, be especially careful to avoid plagiarism." "Unless you are quoting directly, avoid entirely the sentence patterns of the source.

Work Cited

http://www.legalzoom.com/copyrights-guide/copyrights-definition.html

http://www.microsoft.com/security/pc-security/virus-whatis.aspx

http://www.fbi.gov/about-us/investigate/cyber

http://www.theatlantic.com/technology/archive/2013/02/why-does-privacy-matter-one-scholarsanswer/273521/

http://wc.pima.edu/~bfiero/plagrsm.htm

Privacy, Security, and Ethics.pdf

You might also like