Skip to main content

Home/ IB ITGS/ Group items tagged CriterionB

Rss Feed Group items tagged

Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
Elvira Russ

When Is Downloading Music on the Internet Illegal? - Webopedia - 1 views

  •  
    This article discusses what actions are illegal about downloading music, what kind and why. Also what kind of sharing and burning.
Maliha Rahman

Facebook rules out installing 'panic button' (BBC News) - 0 views

  •  
    this is another article that discusses the same issue of my portfolio article, but basically is talks about the rules to install this "panic button"
Maliha Rahman

Facebook Agrees to Install 'Panic Button' in UK (PCWorld) - 1 views

  •  
    This website basically discusses the way in which a panic button is involved and installed onto social networking sites. 
Chalana Perera

Xtra Ordinary Operating System for XO Laptop - OLPC News - 0 views

  •  
    IT background of the issue
  •  
    IT background of the issue
Rafae Wathra

How does an online payment gateway work? (iSmart) - 0 views

  •  
    Simplified version of the different steps to the process of a payment gateway.
Rafae Wathra

Google allows publishers to strengthen `pay walls' (Seattle Times) - 0 views

  •  
    Article is about how indexes search results, and how paywalls can be "leaky."
anonymous

FDIC: End to Identity Theft/Account Hijacking - 0 views

  •  
    This article presents the study of technology used to commit account hijacking and the methods available to prevent it. It gives a clean example of a phishing as a fraud email from Citibank. "The fifth method of acquiring the information necessary to hijack accounts is by inserting malicious software (such as a keystroke logger26), often referred to as "spyware," on a consumer's personal computer at home or on a computer used by many consumers in a public facility like an Internet café"
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
Maliha Rahman

Background on Phishing Attacks-(The Honeynet Project) - 1 views

  •  
    This is a page of the honeynet project. It discusses the history of phishing and how it has developed since 1990. How it has affected businesses and how it's popularity has increased. It also discusses the technology part behind the phishing attacks.
Elvira Russ

History of Phishing (allspammedup.com) - 6 views

  •  
    The history of phishing techniques that people still fall for today. This article discusses phishing from when it first started and why people fall so easily for it, and also how the phishing methods have enhanced.
Elvira Russ

Phishing (mahalo) - 1 views

  •  
    This article discusses the different methods of phishing and also the history of it. It talks about how it has developed into different tactics and different methods used by different people looking for different information.
anonymous

SQL injection - Wikipedia - 0 views

  •  
    This is a code
Rafae Wathra

Ecommerce Security Issues (E-commerce Digest) - 0 views

  •  
    This article explains how online transactions can be protected.
Rafae Wathra

How to Restrict the Access to Your Website (Ezine) - 0 views

  •  
    This article explains how to make portions of a website password protected.
Rafae Wathra

Preventing Online Fraud (Paydit) - 0 views

  •  
    Article about the technology used to keep online transactions safe.
1 - 20 of 42 Next › Last »
Showing 20 items per page