Skip to main content

Home/ IB ITGS/ Group items tagged ITGS

Rss Feed Group items tagged

Elvira Russ

What is Spotify? (Spotify) - 1 views

  •  
    Spotify is a digital music service that gives you access to millions of songs. It is free and legal and you can make your own playlists.
Jeff Ratliff

Navigating China's web of censors (MSNBC) - 1 views

  •  
    "Google's face-off with Beijing over censorship may have struck a philosophical blow for free speech and encouraged some Chinese Netizens by its sheer chutzpah, but it doesn't do a thing for Internet users in China. It merely hands the job of blocking objectionable content back to Beijing. "
Chalana Perera

Strategic Impact of Cyber Attacks (IRL Estonia) - 0 views

  •  
    This article discusses the Russian cyber-attacks on Estonia and how it affected the country and what the country did to "Counter-attack" and prevent further attacks. It features several different opinions on cyber-attacks.
Chalana Perera

US plans for cyber attacks (News24) - 1 views

  • disabled US cell phone networks, slowed internet traffic to a crawl and crippled America's power grid
  • stealth cyber attack and a pair of bombings, cutting electricity to tens of millions of homes.
  • has the authority to use the full powers at his disposal
  •  
    This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
Chalana Perera

Cyber-attack Trends in US Corporations - Statistics (Biz Forum) - 1 views

  •  
    This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
Chalana Perera

Economic Impacts of Cyber-Attacks (CISCO) - 0 views

  •  
    This PDF is a report that discusses research into the economic impacts of cyber-attack on private, small-scale, large-scale, multinational, local and international corporations as well as government financial institutions.
Chalana Perera

Debate over possible responses to cyber attacks (MSNBC) - 0 views

  • the U.S. military's secret offensive cyber capability
  • counterstrike on an attacker's computer network
  •  
    This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
Chalana Perera

Protect the U.S. from cyber attacks (The Hill) - 0 views

  • technological fixes to this challenge may be easier to solve than the underlying policy questions
  •  
    This article looks at some technological possibilities that would help prevent and prohibit extensive cyber-attacks.
ajay tambay

How It Works: Online Gaming (PCWorld) - 0 views

  •  
    How online gaming works. Servers
Elvira Russ

Woman Faces The Music, Loses Download Case (CBS news) - 0 views

  •  
    This is another example of a woman who was sued and what the law can do because downloading music illegally is strictly against the law. This article also gives statistics on how illegal music downloading affects record companies negatively.
Elvira Russ

Statistics of Illegal music downloading (Techdirt) - 0 views

  •  
    This article gives basic statistics of illegal downloading in the United States in percentage. How many there were, why and suggestions to make it stop.
Elvira Russ

Intellectual Property, Legal Issues (Wiki.media-culture) - 1 views

  •  
    This web site discusses what Intellectual property is and why it is such a big issue when downloading music. It also includes the different parts of intellectual property and discusses the actual law.
Elvira Russ

How Does LimeWire Work? (Ehow) - 0 views

  •  
    This article discusses how many users use the programs to illegally share music, video..and how it works, the IT behind it. what the procress of downloading and sharing illegal files.
Elvira Russ

Spotify - Free Music (Dalehay) - 3 views

  •  
    This article discusses why spotify is a good choice of legal music downloading.
« First ‹ Previous 521 - 540 of 622 Next › Last »
Showing 20 items per page