Skip to main content

Home/ Groups/ IB ITGS
Chalana Perera

Protect the U.S. from cyber attacks (The Hill) - 0 views

  • technological fixes to this challenge may be easier to solve than the underlying policy questions
  •  
    This article looks at some technological possibilities that would help prevent and prohibit extensive cyber-attacks.
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
Chalana Perera

Economic Impacts of Cyber-Attacks (CISCO) - 0 views

  •  
    This PDF is a report that discusses research into the economic impacts of cyber-attack on private, small-scale, large-scale, multinational, local and international corporations as well as government financial institutions.
Chalana Perera

Debate over possible responses to cyber attacks (MSNBC) - 0 views

  • the U.S. military's secret offensive cyber capability
  • counterstrike on an attacker's computer network
  •  
    This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
Peter Rock

How the Google-Microsoft conflict could hit open source | Open Source | ZDNet.com - 1 views

  • The plain fact is that the open source ethos of trusting people and accepting diverse opinions in the code stream is directly at odds with China’s Internet policy
Elvira Russ

Congress and Phishing, the laws against phishing - 1 views

  •  
    Congress and Phishing has resulted in phishing laws to protect the internet. discusses the law.
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
Elvira Russ

Phishing (mahalo) - 1 views

  •  
    This article discusses the different methods of phishing and also the history of it. It talks about how it has developed into different tactics and different methods used by different people looking for different information.
Elvira Russ

History of Phishing (allspammedup.com) - 6 views

  •  
    The history of phishing techniques that people still fall for today. This article discusses phishing from when it first started and why people fall so easily for it, and also how the phishing methods have enhanced.
Elvira Russ

The FBI cracks the 'largest phishing case ever - 2 views

  •  
    Some 100 people face 20 years in jail following a two-year investigation by the FBI. This can be used as an example of phishing since it was the largest phishing case ever solved by the FBI.
« First ‹ Previous 141 - 160 of 726 Next › Last »
Showing 20 items per page