Skip to main content

Home/ CSIA 459/ Group items tagged I

Rss Feed Group items tagged

Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
alan savage

How to Stop Saying Um, Uh, and Other Filler Words - 1 views

  •  
    After listening to one of my posts to voicethread, that I thought was pretty solid, I did what my old English teacher did and counted the "um"'s one my fingers. It was bad. I didn't even know I was doing it. But I was doing 2 'um's about every sentence...it's so distracting from your point. I will work on this.
  •  
    Its funny you posted this. My fiance was listening to me comment and he pointed out that almost everyone says um uh and other filler words i thought he was wrong but then i started to notice i was saying it alot and couldnt help but try and stop.
Lee Bry

Enterprise Network Guide - 1 views

  •  
    White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)
  • ...1 more comment...
  •  
    Interesting read. I came across BYOD on other school projects. I think the idea is insane. I could not believe how many organizations were encouraging the bring your own device concept to cut costs. The healthcare industry was one of the biggest advocates from the research I came across.
  •  
    Hmmm I agree with you both, this seems like a horrible idea. I cannot imagine the amount of people who do not properly update, patch and run security scans on their personal devices, I for one would not want to be connected to that in anyway, especially on a business function. I also have to think heavily about the government and contractors dealing with highly sensitive material and I cannot see these trends happening with them. Not just BYOD but also getting rid of the wired LAN's. Good/interesting post.
  •  
    Testing
samuelrios

Homeland Security Drones Designed to Identify Civilians Carrying Guns - 4 views

  •  
    Recently uncovered government documents reveal that the U.S. Department of Homeland Security's (DHS) unmanned Predator B drone fleet has been custom designed to identify civilians carrying guns and track cell phone signals. "I am very concerned that this technology will be used against law-abiding American firearms owners," said founder and executive vice president of the Second Amendment Foundation, Alan Gottlieb.
  • ...2 more comments...
  •  
    Good read. After reading this and another related article (http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/) There's a fine line which must be established before the full use of this technology, however it does raise concerns for the future in terms of privacy. It's primary purpose for homeland security is the survey the borders of the united states. There are certainlly risks involved in its use. Ensuring that this technology is effectively secured from attacks to its onboard weapons and communications systems is equally important to the issues raised in the articles.
  •  
    Good post I've heard chatter about drones being flown over the USA before. I could see the benefits of using drones for recon and counter terrorism, but this opens the door for much larger issues. Where will line be drawn in the sand as far as citizen privacy and avoiding the "big brother" hysteria?
  •  
    The power these drones represent is incredible. I can easily see how the can (and will be) abused. As Jammes pointed out, the Primary purpose of DHS is securing our nations borders, yet I have read of DHS rading peoples homes because of an "improperly" imported car! Not to sound like I am about to put a tinfoil hat on, but I do see the distinct possibility of the banning of firearms in this country as happened in England in 1997. These tools will be in place well before that day.
  •  
    The use of Drones in the field as a tool to fight the fight on the borders is one thing, using them as a tool to fight terrorism is still another, but using them as tool to spy on the people of the United States is another. I think this is one that the United States Supreme Court will be deciding soon.
cpanagopulos

Memory Implants - 7 views

  •  
    Theodore Berger, a biomedical engineer and neuroscientist at the University of Southern California in Los Angeles, envisions a day in the not too distant future when a patient with severe memory loss can get help from an electronic implant. In people whose brains have suffered damage from Alzheimer's, stroke, or injury, disrupted neuronal networks often prevent long-term memories from forming.
  • ...3 more comments...
  •  
    That is awesome!!! Johnny Mnemonic is coming sooner than expected. I watched a grandfather suffer through Alzheimer's. It would be amazing if this could treat such a horrible condition.
  •  
    This is pretty amazing stuff! It would be wonderful if this could actually brought to practical application. We are slowly losing my mother-in-law to dementia or Alzheimer's and it's a terrible process. Losing memories of people is bad enough, but she has lost the ability to perform self-care functions.
  •  
    The fine line between "Crazy" and "Visionary" seems to be demonstrated with this developing technology. Being able to map and store long-term memories in an ailing brain seems remarkable. Achieving this not through drugs or some form of conventional treatment but rather through a silicone chip implanted in the brain is outstanding. I'll be interested in seeing where this development goes.
  •  
    WO!!!! Shut the front door this article is like a science fiction read but the technology if approved for humans can have a dramatic impact on folk who have family members with dementia/Alzheimer as this can possibly make life less stressful for caregivers. It would be nice to see parents and grandparents not have to suffer this dreaded disease if science and technology can provide solution. But I would like to have one myself as I can get all the help I can for TOTAL RECAL!!!
  •  
    Wow, this is crazy. I don't know if I should be terrified or excited. This reminds of the old movie Jonny Mneumonic in the 90s. All these new sciences are great. The only problem that I have is bad people getting a hold of such technologies to exploiting weaker humans. I'm thinking along the line of putting false memories into people's brain and turning them into someone that they are not.
Alvin Thomas

Cybersecurity -- Emerging Technologies in Cybersecurity « WHS WHS - 10 views

  •  
    This is a cool and insightful article regarding emerging cyber security technologies. 
  •  
    I think the part about centralizing a "single federal enterprise network" is a great idea. The federal government has started doing this with things such as the FDCC (Federal Desktop Core Configuration), as well as SCAP (Security Content Automation Protocol), but I think there still needs to be much more. Allowing each federal agency to have their own cyber security within the U.S. seems a little crazy. I think setting one agency to protect the national infastructure, ie the borders of the U.S., down to each agencies front door needs to be standard. Agencies like DOD who have their own Cyber operations centers need to be properly trained and educated if they are going to defend infrastructure. Formalized training needs to be done at the federal level as well as the Civilian level. If you are going to be a security practioner, you must have the credentials, and I am not talking just a Sec+. I think it is time we up the standards on who we call a CyberSecurity professional.
  •  
    Interesting article and objective given. Connecting government cyber operations centers, I think that this will be a hugh, and important step toward achieving a higher level of security. Good read!
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
paksingtham

Growing Data Security Concerns to Drive Global Market for Keystroke and Typing Dynamics... - 4 views

  •  
    I can't see this being used much for single factor authentication, but I could certainly see it being used on top of a username/password setup to bolster the security of that password. Another useful application for this would be to augment an anomaly based IDS running on the user's system. If keystroke patterns/dynamics exceed standard deviation, an alert could be sent to the help desk or security, who could then verify the identity of the user.
  •  
    I could see some companies implementing keystroke and typing dynamics depending on their sector and security posture. However, depending on the sensitivity of the software, they could receive a lot of false positives. I've personally noticed my typing speed fluctuates drastically depending on the time of day. Nevertheless, I could see more companies deploying the software depending of their budget.
  •  
    It seems that there are way to many variables for this technology to really take off. I agree with trevor that there is potential for a high volume of false positives. I also see potential for a high volume of false negatives. This technology seems as though it could end up being extremely frustrating for the end user.
Amy Harding

Video - Digital Nation Life on the Virtual Frontier - 25 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    This video is 90 minutes long. However, if you open the link, the video is separated by nine chapters. You can put your cursor on the bottom of the video and see each of the chapters and the topic. Find at least one chapter of interest to you and watch it. Each chapter tells you how long it is after you start it.
  •  
    What I found most interesting in this video was the research being conducted regarding students who multitask, and their perceived ability of doing it well. In fact, as the experiments and testing show, the researchers are proving just the opposite. The younger generation that believe they are multitasking well are only able to work in small chunks, and their work tends to show this. Students are unable to carry out long tasks, they get bored, and they put together papers in sections which directly correlates to their on and off study habits. I also found myself relating to the discussion of needing to satisfy a thought at the moment it pops, and change from doing one thing say, watching the video, into another, listening to the video, and looking at the photographs I took today. In either case, not accomplishing either with the same effectiveness that I would have had I completed them one at a time. The internet, and multiple monitors, helps feed this addiction.
samuelrios

Unmanned drones making U.S. a Predator nation - 3 views

  •  
    (TomDispatch) Here's the essence of it: you can trust America's creme de la creme, the most elevated, responsible people, no matter what weapons, what powers, you put in their hands. No need to constantly look over their shoulders.
  • ...1 more comment...
  •  
    Samuel, A god article, even though the writer seems very passionate about the topic. Like everything else there are good and bad sides it. I can understand the view point, but have also talked to people who use some of these and people who have been supported by these and yes in the hands of "good" they are a valuable asset. I have even heard of the police using them as they are quiter than choppers. Very good article. Lee
  •  
    Great article Samuel, I had wondered about this topic for a while but did not have the chance to actual research the in's and out's. This article has definitely informed me of the issue. Great find!
  •  
    Sam, Great article. Sometimes people don't always think about the negative side of things. I know about unmanned drones I had not. Thank you for informing us of this.
Gilbert Rivera

Emerging Technologies are Changing the IT Job Market - 0 views

  •  
    This article is pretty interesting. It is about how emerging technologies are changing the IT job market. With the emergence of technologies such as: the world of SDN, Converged Infrastructure, BYOD, Virtualization, ITaaS, SDS, and PAaaS, and of course, "The Cloud," changing the industry pace, many employers are seeking highly competitive personnel to fill these positions. It also provides information on these new IT technologies and the importance to U.S. vendors and employers on these functions.
  •  
    As a member of the general IT crowd at the moment I know exactly what this article is talking about. Many companies, including my own, are moving toward virtualization and cloud everything. Soon enough, I think just about everything will be "as a service", as it is far more cost effective to operate on the client end, and more cost effective to support on the provider end.
  •  
    I find the BYOD moment interesting; personally I would be weary of people connecting their own devices to my network. I know right now it is about providing life style perks to prospective employees, but at some point a mistake will be made and the internal networks could be compromised.
Lisa Ruggiero

Emerging Tech - 2 views

  •  
    This link is has a variety of different stories written about up and coming technology like using viruses to power an electric generator. When I saw it I was thinking what application could this possibly have to technology? Apparently one day viruses will power small devices like your phone. This one is pretty far out and I found the article very interesting. I didn't find anything specific about the writer so I don't know his background other than he is a freelance writer.
  •  
    This is indeed very interesting. It is good to know that someone out there is developing a virus that will benefit mankind. This technology is supposed to be able to replace conventional batteries; it will enable people to charge their smart phones anywhere, even when walking.
Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
samuelrios

HowStuffWorks "How the Predator UAV Works" - 0 views

  •  
    Military commanders use tactics and strategy in combat to inflict as much damage on the enemy while trying to risk as few personnel and resources as possible. This principle was at the heart of the development of the RQ-1 and MQ-1 Predator Unmanned Aerial Vehicle.
  •  
    This was a really cool read, before I read your article I did not even know what the predator UAV was. Thanks for this great information.
  •  
    I always use HowStuffWorks if I read an article about a new technology and don't understand how it works. UAVs is an area where most people don't understand how it works. Nice article.
Phil Kemp

Our Internet Surveillance State - 1 views

  •  
    The article was written by Bruce and published on CNN this month. It discusses the fact that almost everything we do can be and is monitored by someone, and eventually is subject to Government purvue. He shows how several key people who have been found their way into law enforcement pathways have taken many precautions, but all eventually were caught by other means which were correlated together to form the big picture.
  •  
    Phil, I have to say after reading this I am glad I still have a flip phone with no smart technology on it. I have read were your smart phones embed the lat/long into pictures if that function is turned on and that data can be retrieved from facebook if you have the right software. It just goes to show that what we see on TV has an impact on what we have in real life. Lee
glenn_g

Thinking Putty defeats Fingerprint Scanners! - 1 views

  •  
    Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
  •  
    Glen, This did a little to damage fingerprint biometric technologies when it was first discussed in the public. I read the original article I think, when Matsumoto was using original gelatin to fake the scanners. There was also a documentary, or short news clip I had seen awhile back in which he demonstrated it. Newer technologies are starting to combine (multi-factor) authentication in order to gain access now, such as fingerprint and iris. This should help curb things like this, as well as stop the backdoor of username and password. phil
Leo T Garcia

Near Field Communications Primer - 1 views

  •  
    Here is a primer on Near Field Communications (NFC) which is a set of standards for smartphones that establishes radio communication between similar devices which are in close proximity. It is a subset for RFID (radio-frequency identification) and is being integrated into our daily lives as in most technology. The low-cost NFC tags practical uses are limited only by imagination, the challenge will be is to mitigate the cybersecurity risks it poses.
  •  
    Here is another video presentation on NFC. http://www.youtube.com/watch?v=_RBbuGwC7Eg
  •  
    I have to say this was a very interesting video to watch, and I see now how these things work and what we can do with them. I do like the fact that they have a shorter range than Bluetooth as well as less power consumption. I would still be worried about losing information when say on a crowded train or bus. People could brush up against your phone and you may not realize it. thanks for sharing. Lee
Michael Austin

NFC Phones Raise Opportunities, Privacy And Security Issues - 1 views

  •  
    An article detailing the privacy concerns regarding mass implementation of NFC technology in mobile devices.
  • ...1 more comment...
  •  
    Michael, privacy is just going to become more and more of an issue as time goes on. Good post. Ben
  •  
    Michael & Ben, Did you know that iPhone 5 passed on Near-Field Communication Data Sharing while Samsung, Nokia and HTC didn't ? Article: Android Embraces, iPhone 5 Passes on Near-Field Communication Data Sharing http://www.scientificamerican.com/article.cfm?id=near-field-communication-security-purchase Sam Rios
  •  
    Hi Sam, I had noticed that the iPhone 5 wasn't using NFC. I didn't research it further though, as I honestly don't care for Apple products (way overpriced imho). There are numerous reasons Apple may not want to use NFC, which could be anything from them having a competing technology and not wanting it to prosper to them simply not seeing the value the technology in its current implementation (it is still in its infancy in some respects). I found a site which was able to list numerous reasons NFC is lagging behind: http://news.cnet.com/8301-1035_3-57441842-94/is-nfc-killing-google-wallet/ ~Mike
Bob Lloyd

Centralized Management | Sourcefire - 0 views

  •  
    Testing.....
  • ...1 more comment...
  •  
    I see Bob's post
  •  
    Bob, still not sure what was up (prob my issue), I can def. see/comment on it now. The sourcefire technologies you posted stuck out to me mainly in one way...they boast that they are a little bit more secure, which is always good, but at under half the price (of the industry average for IDS). They have many good ideas and tools in place to try and get to the top it seems!
  •  
    I used this product in 2010. Very cool and as I recall rather expensive.
1 - 20 of 74 Next › Last »
Showing 20 items per page