Skip to main content

Home/ CSIA 459/ Group items tagged THAT

Rss Feed Group items tagged

Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
Percy Kendrick

What will IT be like in 50 years? - 0 views

  •  
    This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
  • ...1 more comment...
  •  
    I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
  •  
    Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
  •  
    Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
samuelrios

Homeland Security Drones Designed to Identify Civilians Carrying Guns - 4 views

  •  
    Recently uncovered government documents reveal that the U.S. Department of Homeland Security's (DHS) unmanned Predator B drone fleet has been custom designed to identify civilians carrying guns and track cell phone signals. "I am very concerned that this technology will be used against law-abiding American firearms owners," said founder and executive vice president of the Second Amendment Foundation, Alan Gottlieb.
  • ...2 more comments...
  •  
    Good read. After reading this and another related article (http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/) There's a fine line which must be established before the full use of this technology, however it does raise concerns for the future in terms of privacy. It's primary purpose for homeland security is the survey the borders of the united states. There are certainlly risks involved in its use. Ensuring that this technology is effectively secured from attacks to its onboard weapons and communications systems is equally important to the issues raised in the articles.
  •  
    Good post I've heard chatter about drones being flown over the USA before. I could see the benefits of using drones for recon and counter terrorism, but this opens the door for much larger issues. Where will line be drawn in the sand as far as citizen privacy and avoiding the "big brother" hysteria?
  •  
    The power these drones represent is incredible. I can easily see how the can (and will be) abused. As Jammes pointed out, the Primary purpose of DHS is securing our nations borders, yet I have read of DHS rading peoples homes because of an "improperly" imported car! Not to sound like I am about to put a tinfoil hat on, but I do see the distinct possibility of the banning of firearms in this country as happened in England in 1997. These tools will be in place well before that day.
  •  
    The use of Drones in the field as a tool to fight the fight on the borders is one thing, using them as a tool to fight terrorism is still another, but using them as tool to spy on the people of the United States is another. I think this is one that the United States Supreme Court will be deciding soon.
cpanagopulos

Agency Spends Millions Purging Fake Cyber Threat - 3 views

  •  
    Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
  • ...1 more comment...
  •  
    Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
  •  
    What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
  •  
    I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
Amy Harding

The 15 worst data security breaches of the 21st Century - CSO Online - Security and Risk - 9 views

  •  
    Interesting read, the Dept. of VA breach is a good reminder about physical security. It seems that quite often we focus so much on the technical that the fundamental is overlooked. It find it interesting that they have Stuxnet on this list. It is my understanding that Stuxnet was not really a data breach but more of a process breach.
Amy Harding

Embrace the cloud computing revolution - with caution | Comment is free | guardian.co.uk - 1 views

  •  
    For your cloud computing assignment
  •  
    I liked this article very much and understand his concerns. It is very hard to trust something that you can't examine. How do cloud computing agencies validate their systems, with there be a GOP security report that tells us what agencies are legitimate. I have to read that top 10 cloud reporting article to see exactly how that was determined.
Phil Kemp

Our Internet Surveillance State - 1 views

  •  
    The article was written by Bruce and published on CNN this month. It discusses the fact that almost everything we do can be and is monitored by someone, and eventually is subject to Government purvue. He shows how several key people who have been found their way into law enforcement pathways have taken many precautions, but all eventually were caught by other means which were correlated together to form the big picture.
  •  
    Phil, I have to say after reading this I am glad I still have a flip phone with no smart technology on it. I have read were your smart phones embed the lat/long into pictures if that function is turned on and that data can be retrieved from facebook if you have the right software. It just goes to show that what we see on TV has an impact on what we have in real life. Lee
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Jessica Riedel

How to run your own NSA spy program - 2 views

  •  
    With everything going on in the news about this I found this to be a humorous approach to the whole thing. This article basically describes the NSA program on a fundamental level and how an everyday Joe (if they had enough data storage that is) could create their own spy program using these tactics.
  •  
    A spy kit to go. Virtually everything you need to set up shop to gather information and spy on something ( corporate or private). All the hacking tools are nearly " off the shelf" and are most likely used for spying. Great post and article.
  •  
    This article gave me a headache thinking about all the data collection. I am not surprised by this at all Google and Facebook are the biggest privacy violators out there. At what point do people drop off the grid to hide from this potential? The reality is that most people have no idea that this potential is out there except for the ones that want to exploit it.
Gilbert Rivera

EBSCOhost: Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Jessica Riedel

Mozilla: Ad Networks Have No 'Constitutional Right' To Set Cookies - 2 views

  •  
    With all of the privacy issues running rampant today, it looks like Mozilla is taking a stand against third-party cookies. Essentially they want to stop the third-party cookies from collecting data about the user's browsing habits and create the Internet people expect. Even though it isn't mentioned I think its an excellent marketing strategy against other browsers, cough cough Google, that rely on these cookies to track user habits and provide/tailor their product. This is a short description of the article: Mozilla recently drew the ire of the online ad industry by announcing plans to move forward with a project to block third-party cookies in the Firefox browser. Randall Rothenberg, President and CEO of the Interactive Advertising Bureau, publicly called on the company to retreat, arguing that it shouldn't try to implement "economic and cultural policies."
  •  
    It's bad enough that retailers are looking into or actually using camera footage to capture our spending and shopping habits without posting any warning. Thanks for the artical posting.
  •  
    I give Monzilla credit for being the first to step up about this issue. If they could stop the third party cookies I am sure a lot of users would jump over to their browser. The problem is that data is used for advertising which is used by companies like Monzilla to sell advertising space
Bob Lloyd

Intelligent 'iKnife' diagnoses cancer midsurgery | Cutting Edge - CNET News - 1 views

  •  
    This article is about an intelligent knife that allows surgeons to minimize bleeding during operations but also has a mass spectrometer that analyzes chemicals when cutting. The knife has the potential to reduce tumor recurrence.
  •  
    I had read this article on the Internet and found this an amazing use of the technology. The ability to determine if an entire tumor is removed at the time it's being done eliminates risk for the patient and waiting for lab results.
Amy Harding

Cryptographic Module Validation Program (CMVP) - 8 views

  •  
    Read and explore this NIST website. Do you see any products that are you are familar with? Can you determine how this program enhances the security of these products?
  •  
    After looking through the website, I found the Vendor list for 140-2, which provides what I would think is the complete product list of Vendors and products which meet the standard. A couple items which meet the standard are Microsoft Windows 7 Bitlocker Drive Encryption, and Research In Motions Blackberry Cryptographic Kernel. It is important that the CMV Program is in place within the U.S. If we are going to rely on encryption to keep our secrets safe, then the products we use to encrypt our data, need to be checked to ensure they are secure.
Shondre Fort

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - 0 views

  • Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.
  •  
    SCORE (System, Component and Operationally Relevant Evaluations) is a unified set of criteria and software tools for defining a performance evaluation approach for complex intelligent systems. It provides a comprehensive evaluation blueprint that assesses the technical performance of a system and its components through isolating and changing variables as well as capturing end-user utility of the system in realistic use-case environments. The SCORE framework has proven to be widely-applicable in nature and equally relevant to technologies ranging from manufacturing to military systems. It has been applied to the evaluation of technologies in DARPA programs that range from soldier-worn sensor on patrol to speech-to-speech translation systems. It is also currently being applied to the assessing the control of autonomous vehicles on a shop floor.
  •  
    From NIST Tech Beat: June 21, 2011 Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."
paksingtham

Growing Data Security Concerns to Drive Global Market for Keystroke and Typing Dynamics... - 4 views

  •  
    I can't see this being used much for single factor authentication, but I could certainly see it being used on top of a username/password setup to bolster the security of that password. Another useful application for this would be to augment an anomaly based IDS running on the user's system. If keystroke patterns/dynamics exceed standard deviation, an alert could be sent to the help desk or security, who could then verify the identity of the user.
  •  
    I could see some companies implementing keystroke and typing dynamics depending on their sector and security posture. However, depending on the sensitivity of the software, they could receive a lot of false positives. I've personally noticed my typing speed fluctuates drastically depending on the time of day. Nevertheless, I could see more companies deploying the software depending of their budget.
  •  
    It seems that there are way to many variables for this technology to really take off. I agree with trevor that there is potential for a high volume of false positives. I also see potential for a high volume of false negatives. This technology seems as though it could end up being extremely frustrating for the end user.
Ken Ripley

Your cell phone is spying on you - 2 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
  •  
    Ken, This was a very good article. Nothing that I had not heard in the recent couple years, but you can see how society is being tracked to the point that no civil liberties union will be able to do anything anymore. The byproducts of the features that everyone wants, i.e. for convenience, are what allow these agencies monitoring and mining all of this data, with our silent approval. The use of this data will only continue to rise, and we will soon see if the secure state we are building will do more good than bad.
1 - 20 of 96 Next › Last »
Showing 20 items per page