question archive Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone

Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone

Subject:Computer SciencePrice:17.86 Bought3

Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates' posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not 'attaboys'.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not 'nice post' or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Spinbot in All Data States

Introduction

Computer security extends to data protection where threats can occur at any time through undetermined ways. This makes it necessary to protect it in all states. Generally, data can be in use, motion or rest state. An intruder targeting the data can easily access it and perform any form, of malicious actions that include manipulation, deletion, destruction, and copying of the data.  To ensure that data is protected users need to apply cryptographic means such as Spinbot where information is encoded, thus ensuring that only those with authorization can have access to it. This paper will explore the use of Spinbot in each of the three data states.

Data at rest

Spinbot helps to ensure to protect the possibility of a data breach. In most cases, ransomware and other malicious attacks are targeted to the data at rest. Although data at rest is protected by other aspects of security such as firewalls and installed intrusion detection and prevention systems, Spinbot serves as a major line of defense. Therefore, Spinbot translates the data from normal form to a different form that's enabled by the existing Spinbot algorithms. This ensures that an intruder would not read the data even if they progress to the storage location and the specific files. Generally, the decryption of the data is only left to those who hold a decryption key that's made to remain secret. The article explains further that "Data that is being sent from a client to the storage server to be written is intercepted and encrypted by the security appliance and then sent to the storage server, which stores the data in encrypted form.” (Bojinov & Subramanian, 2016)

Data in motion

Data in motion entails the state at which information is under transit to another user or device through a network.  Transit of data over a private network or internet faces the threat of a malicious intrusion that would risk it from being read through sniffing or possibly diverted, destroyed, accessed or changed from the original meaning. Spinbot ensures that the data is protected and the aces would require the Spinbot key that's secretly shared between the sender and receiver of the data. "Spinbot adds a layer of security to make data unusable if, despite all efforts, someone does get unauthorized access to the raw data.” (Sien, Samsudin & Budiarto, 2014)

Data in use

Data in use refers to information that a user is operating on in the current digital state. Data in use is normally held by the cache, RAM and CPU registers.  Data in use requires more emphasis on protection compared to the other states of digital data.  Hence, failure to protect data in use may lead to compromise of the other states leading to their ease of access despite their included Spinbot mechanisms. Thus, Spinbot should be applied to the data in use as part of the strict measure of ensuring data protection. Possibly, if an intruder gets access to data in use especially to the RAM, they can target to finds the Spinbot keys and this would lead to access to those that open the data in transit and data at rest. "Spinbot tools of various shapes and sizes, can effectively prevent data loss or breaches, regardless of the state of the data." (Ryan, 2019)

Conclusion

Protecting sensitive data is a key aspect of computer security. Data is a major target of the intruders and utilizing the Spinbot algorithms offers a major way to mitigating and preventing the dangers data owners would face in case of a malicious attack. This applies to the three digital data states.  The decryption of the data is only left to those who hold a decryption key that's made to remain secret. Data security is a major influence towards ensuring compliance with the safety of records concerning different bodies such as HIPAA in case of healthcare data.