Entradas

Ethics and Legal Responsibility

Imagen
"Legal ethics is a term used to describe a code of conduct governing proper professional behavior, which establishes the nature of obligations owed to individuals and to society" (FindLaw, 2018).  The fact that people or institutions have a right to do something doesn't imply that they should do it. The law sets out what people are free to do, regardless of the effect that those actions have on others. For example, in Mexico The Federal Civil Code establishes 14 years of age as the minimum age for girls to marry and 16 years of age for boys. It is legally posible for mature adults to marry young girls but ethically it's not right because these are harmful practices that not only do they seriously affect the life, health, education and integrity of girls, but also violate the human rights of every little girl who has the misfortune of being a victim of this awful practice. Having the legal right to do something is not the same as fulfilling one's ethical ...

Cryptography

Imagen
The fact is there's no such thing as a perfectly, 100& secure computer system. There will always be bugs and security experts know that. So that were System Architects employ a strategy called defense in depth, which uses many layers of varying security mechanisms to frustrate attackers. A common reference to this is looking back at medieval times where you have a to keep safe the King of a land and it's castle. Attackers or enemies need to beat or dodge various obstacles in order to gain access to the castle and conquer it, but int this context we're talking about the most common forms of computer security called   Cryptography. Whats is Cryptography? The word comes from the roots 'crypto' + 'graphy' which roughly translates to  = Secret Writing. In order to make information secret you use Cipher, an algorithm that converts plain text into CipherText. Whats is Encryption? T...

Internet Security and Privacy

Imagen
Private data and civil liberties are at risk nowadays there isn't enough transparency so that people are aware of how their data is being shaped and circulated. Most users don't have technical expertise and leveraging internet power requires those set of skills and people with those with enough abilities always stay ahead of institutional power or controls. That is why cyber crimes are still present, even as the government power gets better. This is why whistleblowers can cause so much damage. Institutional controls let companies use data but they put very strict conditions to prove that they are not misusing that data. Privacy is about consumer trust, it's about online user trust.   In the digital age, we typically apply the concept of data privacy to critical personal information, also known as personally identifiable information (PII) and personal health information (PHI). But why is privacy important? Privacy is a limit on government power, as wel...

TC2027 Week 1 Computer and Information Security

Imagen
Setting up the Blog for Computer and Information Security Course

Patrol Unity 101

Imagen
Creating a patrolling movement in a Game object can be hard but by creating waypoints that specify the path to be followed by your object it can be an easier task. https://cocalp.wixsite.com/unity101

User interface design and software verification and validation

Imagen
User interface design and software verification and validation User interface design  is the  design  of  user interfaces  for machines and software with the focus on maximizing usability and the  user  experience.  focuses on anticipating what users might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions. UI brings together concepts from  interaction design ,  visual design , and  information architecture . They are 19 principles of  User Interface Design: Clarity is job  Interfaces exist to enable interaction Conserve attention at all costs Keep users in control Direct manipulation is best One primary action per screen Keep secondary actions secondary Provide a natural next step Appearance follows behavior Consistency matters Strong visual hierarchies work best Smart organization reduces cognitive load Highlight, don't...

TC1019 Course Review

TC1019 Review Decidi hacer este post en español para explayarme más y dar a entender mejor mi punto de vista sobre el curso de  Fundamentals of Software Engineering que tome con el profesor Ken Bauer . Temas : En el curso en total son 20 temas que vimos a lo largo del semestre, mas o menos por que también nos dejaba leer algunos artículos que tenían mucha información muy interesante y sentías como si fuera otro  mastery topic . Los temas son muy variados, lo cual es muy importante por que si te enfado uno o no te intereso tanto ese tema puedes investigar otro tema de los  mastery's , ya que no tienen un orden particular. En lo personal los temas con los que más di click o me interesaron bastante fueron open source software, XP,  software design y  software architecture; creo que se nota por que fueron los blogs más enfocados en mi punto de vista y no tanto investigación que encontré. Abolish Grading: Este...