Friday, August 2, 2019

Suggestion to improve the course

There are no improvement for this course. It's already good and perfect.

The importance of privacy, security, legal and green computing awareness for society.

Privacy
Privacy is about respecting individuals. If a person has a reasonable desire to keep something private, it is disrespectful to ignore that person’s wishes without a compelling reason to do so. Of course, the desire for privacy can conflict with important values, so privacy may not always win out in the balance. Sometimes people’s desires for privacy are just brushed aside because of a view that the harm in doing so is trivial. Even if this doesn’t cause major injury, it demonstrates a lack of respect for that person. In a sense it is saying: “I care about my interests, but I don’t care about yours.”

People establish boundaries from others in society. These boundaries are both physical and informational. We need places of solitude to retreat to, places where we are free of the gaze of others in order to relax and feel at ease. We also establish informational boundaries, and we have an elaborate set of these boundaries for the many different relationships we have. Privacy helps people manage these boundaries. Breaches of these boundaries can create awkward social situations and damage our relationships. Privacy is also helpful to reduce the social friction we encounter in life. Most people don’t want everybody to know everything about them – hence the phrase “none of your business.” And sometimes we don’t want to know everything about other people — hence the phrase “too much information.”

Privacy helps protect our ability to associate with other people and engage in political activity. A key component of freedom of political association is the ability to do so with privacy if one chooses. We protect privacy at the ballot because of the concern that failing to do so would chill people’s voting their true conscience. Privacy of the associations and activities that lead up to going to the voting booth matters as well, because this is how we form and discuss our political beliefs. The watchful eye can disrupt and unduly influence these activities.

Security
We live in a crazy world. Well, that might be a bit of an understatement; it’s crazier than a bunch of bats in the belfry. Flipping on the TV or checking your Facebook newsfeed, you are usually greeted by a harrowing news story that shakes your soul and gets you questioning everything all around you. One day there’s a movie theater shooting, the next day there’s outrage over the illegal killing of an animal across the ocean. There’s just no telling what you might see. For the moment, let’s focus on the killing of Cecil the lion by dentist Walter Palmer. No matter which side of the debate you fall on, the whole story demonstrates the importance of armed security guards.
According to Breitbart.com, Awr Hawkins writes, “As the anti-trophy hunting the backlash continues in the wake of Cecil the lion’s death, one of Minnesota dentist Walter Palmer’s homes has been vandalized and he has been forced to hire armed security for himself. During the last week, Palmer has been vilified internationally and has reportedly received death threats in addition to real property damage.”
Yes, the backlash has been intense and Walter Palmer fears for his life, so he has hired armed security guards. Did he do something illegal? Perhaps. Is he in the right? Who knows. As a security company, it is our responsibility to quell the storm before it explodes. Unarmed or armed security guards help to ease tension before it rips everything apart and that is a very important part of maintaining stability in society.
Legal
Theorists have traditionally maintained that there are certain broad views on the substantive criminal law. One set of such constraints concerns the sorts of behaviour that may legitimately be prohibited. Is it proper, for example, to criminalize a certain kind of action on the grounds that most people in one’s society regard it as immoral? The other set of constraints which concerns what is needed in order to establish criminal responsibility that is liability, independently of the content of the particular statute whose violation is in question.
Legal system reflects all the energy of life within in any society. Law has the complex vitality of a living organism. We can say that law is a social science characterized by movement and adaptation. Rules are neither created nor applied in a vacuum, on the other hand they created and used time and again for a purpose. Rules are intended to move us in a certain direction that we assume is good, or prohibit movement in direction that we believe is bad.
The social rules are made by the members of the society. Disobedience of the social rules is followed by punishment of social disapproval. There is no positive penalty associated with the violation of rules except excommunication or ostracism. On the other hand, law is enforced by the state. The objective of law is to bring order in the society so the members of society can progress and develop with some sort of security regarding the future. The state makes laws. Disobedience of state laws invites penalty, which is enforced by the government by the power of the state. What is not enforceable is not Law.
Green Computing
Green computing is important to society due to the prolific manufacturing and use of electronic equipment in modern societies. In addition to the environmental impacts of the energy production necessary to run this equipment, of concern are the materials used to produce electronics, and how to dispose of electronic waste.
Also known as green technology, green computing seeks to minimize negative environmental impacts through the responsible use of electronics, through the creation of energy-efficient designs (such as with CPUs), through the implementation of recycling programs that can repurpose existing computers, and through the designing of manufacturing processes that minimize waste.
One of the earliest and most recognized voluntary public initiatives for green computing was the Environmental Protection Agency's introduction of the "Energy Star" label in 1992 that is commonly seen on laptops and computer displays. This program was also adopted in Europe and Asia.
Some of the regular practices that can be employed by the home electronic or computer user to support green computing include the use of the sleep or hibernate functions when not actively using a unit, powering computers completely off overnight, considering the purchase of refurbished units as opposed to new ones, and complying with local guidelines for the safe and responsible disposal of waste equipment.

Evolution of internet and web authorization

Internet
The origins of the Internet date back nearly 40 years, with the U.S. military's funding of a research network dubbed Arpanet in 1969. Since then, the Internet has undergone more than just a name change. The number of computers connected to the Internet has grown exponentially, while the number of users has risen from a handful of computer scientists to 1.5 billion consumers. The network's reach has expanded beyond the United States to every corner of the globe. But its popularity has a dark side, as it has evolved from a friendly research network to a hotbed of criminal activity including fraud and identity theft.

Internet usage has exploded since 1995, when researchers first started tracking this statistic. Although estimates vary from the Internet having 1 billion to 1.5 billion users, everyone agrees that the 'Net has room for growth as the worldwide population tops 6 billion. That leaves more than 4 billion people around the world without Internet access today.

Internet becomes a global phenomenon.The Internet has changed from a U.S.-dominated communications medium to one that is seeing its fastest growth in Asia and Europe.Now everybody is using internet in every second,and can't live without internet.

Web authorization
Authentication is the process of verifying the identity or authenticity of a person or an entity. Let's go back to the time that the world was not yet introduced to computers and the internet. If a customer of a bank had to withdraw some money from the branch, how would it take place? The teller at the branch would ask the customer for a proof to confirm that he/she is the valid customer. The customer would then sign on a piece of paper, which would be compared with the signature provided by the customer at the time of opening the account. With the advent of computers, the signature was replaced by the password. The user would set a password value during registration and then provide it each time to access the account.
Authentication is the process of verifying the identity or authenticity of a person or an entity. Let's go back to the time that the world was not yet introduced to computers and the internet. If a customer of a bank had to withdraw some money from the branch, how would it take place? The teller at the branch would ask the customer for a proof to confirm that he/she is the valid customer. The customer would then sign on a piece of paper, which would be compared with the signature provided by the customer at the time of opening the account. With the advent of computers, the signature was replaced by the password. The user would set a password value during registration and then provide it each time to access the account.
However, as the internet has been evolving, authentication schemes have also been evolving. Let's take a look at some of the authentication schemes starting from the simplest HTTP Basic authentication to more sophisticated schemes.
The Hypertext Transfer Protocol (HTTP) that is generally used for building web applications provides 2 forms of authentication – Basic and Digest.

HTTP Basic Authentication

HTTP Basic Authentication - If a browser or program sends a request for a web page that requires Basic authentication, the server responds with an error that contains a 'WWW-authenticate' attribute in the header. The user then enters a username and password, which is sent to the server in a Base64-encoded form.

HTTP Digest Authentication

HTTP Digest Authentication works similar to Basic but is stronger as it uses 'hashes' while sending the username and password to the server. When a request for the web page is sent, the server sends back a response with a 'WWW-authenticate' attribute in the header and a 'nonce'. A 'nonce' is a string, which differs for each request. The client uses a series of hashes that involve the username and password, the requested URL, the authentication realm name and nonce, and sends the request again. The server picks the password from its data source and again goes through the same process of hashing and compares the results. Authentication is a success if the values match.





Five sentences in your native language and translate into English

开心 = Happy
伤心 = Sad
生气 = Angry
成功 = Success
失败 = Failure