Skip to main content

Home/ ITGS News/ Group items tagged ITGS-security

Rss Feed Group items tagged

Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
Saida K

Google: Internet freedom is declining - 1 views

  •  
    The Government censorship has expanded outside of China.
  •  
    This news item meets the requirements for ITGS because it includes all strands of the ITGS Triangle: Social/Ethical Issues, Application to Specific Scenarios and IT Systems. The Social and Ethical issue includes security, the digital divided and equality of access and surveillance.The government has decided to block certain videos from youtube, or articles from other websites regarding the negativity of the country. In other words, citizens and residents of that country won't be allowed to access "negative news" about the country they're currently living in. The digital divide and equality of access is relevant in this case because many other countries can see what different countries have blocked, meaning that for example, a person living in Germany that was not allowed to access information over "neo-Nazi content" may find information that was banned in Thailand about "the Thai king, Bhumibol Adulyadej, with feet near his head." Surveillance also is considered a social impact because the government is monitoring the actions of others, in terms of what they're posting online. The application to specific scenarios would be politics and government since the government is controlling the use of information through censorship. In all, the article explains what the government has controlled over the internet in company with Google, which includes Blogger, YouTube, AdWords, Google Maps and others. But the fact that the government is isolating the amount of information does not suffice the statement that people have the right to have their internet freedom.
  •  
    This is really interesting! I didn't know about this digital censorship around the world. I knew about how most information is censored in different places in the world, but not in regards to places such as Germany. There are various methods of censorship and more ways than one of being able to get past them; one example is the use of proxies. Again this strikes me as something absurd. I have never heard of digital censorship in a country such as Germany, where there are so many sources for access to data. Why the government would ban such information I still cannot fathom, but the impacts that this arouses are serious, especially in regards to surveillance and the digital divide and equality of access. But ultimately, this was a very captivating post.
Madeline Brownstone

BBC NEWS | Programmes | Click | How biometrics could change security - 0 views

  •  
    Recent losses of personal data held on discs, laptops and USB keys by governments and companies have highlighted the need for better security. Here Dan Simmons looks to see if biometrics can help.
  •  
    Recent losses of personal data held on discs, laptops and USB keys by governments and companies have highlighted the need for better security. Here Dan Simmons looks to see if biometrics can help.
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS. The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use. The specific scenario that this IT system and its impacts are based upon is politics and government. The act
Kim T

BBC NEWS | Middle East | Is that cellphone kosher? - 1 views

  •  
    The Haredi community limits their access and use of the phone and internet to protect themselves. However, this causes a separation between those who have different views on what extent the limitation should be put up to.
  • ...5 more comments...
  •  
    This article meets the requirements for ITGS because it mentions the three strands related to the ITGS triangle. The social and ethical significance includes the digital divide and equality of access, policies, people and machines and digital citizenship. In this article, members of the Haredi community in parts of Israel were restrained to usages of the internet and cellphones. There are a few people who do use what we consider all the normal features of the internet and cellphone but many others use "kosher" cellphones that do not allow texting, internet usage or even calling numbers that are of non-kosher cellphones. For those who use the government's internet, they have to follow the policies set up by the government's filtered internet service provider and are unable to go on many websites. Because of their limited access as well as for many youths who are given restrictions, they are on one end of the digital divide. Once they may actually have control to use the internet freely as some people may choose to do in their area, they will have to learn self control and stay within the boundaries of digital citizenship because they were not familiar to the use of IT growing up. Furthermore, the use of internet raises concern in the Haredic community and some members look down on others for using it because the internet may interfere or give them "unsafe" images against their religion, therefore relating to people and machines. All these are related to the interference for those who do business online and need access to certain websites and the government's censorship on the internet.
  •  
    It really makes me wonder about the things that people do because of their devotion to God and religion. However, people who need it for business should be able to surf the net without having the "urge" to do anything else but do research. Filter or no filter, it's up the person to make those smart decisions and not look up anything inappropiate other than what their top priorities are for even going online. Even if filters are installed, some people who are a whiz at computers could easily use proxies or unblock any material they want. But it's all up to the person and how strong their values and beliefs are.
  •  
    Dear Kim, All I have to say about this article is...WOW. I think that this article is very interesting . I didn't know that in order to sign up a child for school you would have to have a certain cell phone number in order to call the school or for the school to call you. The school also requires a certain cell phone. I think this is a little extreme to allow your child just attend the school. I also find it a little crazy to constrict the internet as well. If a child has a school assignment based on something not found in that service package, they would have to go to very far lengths to do the assignment.
  •  
    Wow this is amazing. I have never heard of such a thing, and it intrigues me that there is such a thing as phone's influenced by RELIGION. It's new and strange to me because I can't believe a religion would take it as far as making phones with such restrictions. It intrigues me though, and it makes me very curious as to how the restrictions so many things have on childrens lives will affect them. Will they grow up like any other child or will they come out different and strange?
  •  
    Wow, this is simply the most fascinating article I have ever read. It's interesting how the Haredi community isolates themselves from the use of technology. But of course, as times modernize, it's important to be in contact for safety reasons. This kosher cellphone is quite unique, only for the kosher stamp found in foods as well, because it's basically a smaller cellphone version of the ones that first came out. But this community surprisingly reminds me of the Amish, how they choose not to use any technology, the only difference being that Amish don't use electricity at all, where the people of the Haredi community do. But I don't think it's easy living without technology these days, now that everything is going to involve technology in the future. Like the Shift Happens Video: Did You Know 3.0 "We are currently preparing students for jobs that don't yet exist...using technologies that haven't been invented...in order to solve problems we don't even know are problems yet."
  •  
    This is a very interesting article, I am still shock how religion still influences some people today. It is even more shocking because in the article that I picked, the situation was exactly opposite. People and governments were demanding equality of access. I am shocked at this people are voluntarily limiting themselves from the rest of the world. I wonder in this ever evolving digital age will these traditions last for much longer?
  •  
    This article exemplifies the impact that technological integration has had on the preservation of traditional customs and morality from the Jewish perspective. Interestingly technology in this case also defines a person for the strength of his or her religious commitment, for example: if one does not have a "kosher phone", then he is not to be admitted into Jewish society because he is ultimately characterized as being immodest and immoral. Restraining one's self from the magnetism of the internet and the dangers it also possesses is illustrated once one takes certain measures to signify the act of taking a stand to secure the sacredness of religion and customs. But once I began thinking about this concept, I started to change my mind gradually. I believe that yes, technology is a potential threat to one's "beliefs", but it only becomes a problem once the user allows such practices to get out of hand. We come back to the same idea: technology has become a label, something that defines us superficially in the minds of others. Just because one may not have a kosher phone, does not have to mean that that person is sending inappropriate texts to another cell phone user. Our bond of trust and reliability upon others is destroyed once we enter the position of forming inconclusive judgements based on the type of technology used and the limitations it draws.
Madeline Brownstone

India in talks with BlackBerry maker for access to corporate email service | Technology... - 1 views

  •  
    This article Talks about Research in motion, the company of blackberry in talks with India about the services that the phones provide
  •  
    This article meets the standards of ITGS. From assessing this article through strand 1 we see that their are a number social and ethical conditions to be considered in this story. Security is a major issue here, RIM's encryption is so secure that not even powerful governments can't crack. This brings up the issue of security because countries like India are worried that this secure network can be abused by the terrorists. This brings up the issue of the digital divide and equality of access. This issue is brought up because India was threatening to disrupt Blackberry access because India did not have access to some features that blackberry users from other countries have. This leads to another problem, Reliability and integrity. Since RIM's network is the most secure network that even the most powerful governments can't crack, because of this many Corporations use Blackberry, RIM fears that if they(RIM) allow governments get a little more access, they will lose their reliability of their majority steak holders. This brings up the number of steak holders, the steak holders are RIM. their customers, India, and other middle eastern countries who are threatening to cut off service due to inequality of access. The IT systems that are mentioned are cellphones, and RIM's network. The applications that apply to the article are Business and employment, and governments control and use of information.
  •  
    Nick originally posted this article, but did not cache it.
Madeline Brownstone

Facebook fraud a 'major issue' | Technology | guardian.co.uk - 6 views

  •  
    People's face book accounts are being hacked by others alarming all the users about their security.
  • ...2 more comments...
  •  
    This article meets the requirements for ITGS. This article talked about how face book accounts were being hacked by others and not just for the fun of it but fraud has arisen from this. One hacker signed onto a students account telling her friends that "she was "stranded" in another country"(Halliday), and needed large amounts of money. The stakeholders in this case are all 500 million users of face book, because they may be at risk of getting hacked. Social and ethical issues that have come up due to the hackings are Surveillance, Security, and people and machines. I think surveillance is definitely one because now that the owners or the ones in charge of facebook are aware of the issue, they will set up programs that will detect any unusual activity from the users. People will be informed where their account is being accessed from and if there is any suspicious activity. Security was definitely an issue because now hackers are using the identities of others to obtain what they want. People and machines is another social ethical issue. While the owner of an account might not be at risk physically, or at risk at all, the person friends may be. They would be attacked by asking them to give money, obtain secret information about the user, or simply cyber bullied. If anything this probably ties into business, although its not legal business, but there is one person making money.
  •  
    Please go back and "cache" this page.
  •  
    I agree with you on the issue of security and problems with hackers in this day and age. However, there is something that you may not have thought about. What happens when people create fake Facebook accounts in the name of other people? They have the power to not only use someone else's identity, and enter their friends group, but also create much damage for the person. It is harder to hack a person's account than to just create an account with anyone's desired name. It's a scary thing to know that there many be another Carmen in the world, that looks exactly like you, even taking up your likes/dislikes, and doing everything as if they were you, when it is clearly not. That is an entirely new issue of privacy, and authenticity. An email, user ID, and picture of you is all they need. Anything is possible, whether it's hacking, people not hiring or accepting you into their college because of your Facebook, or having someone take your identity. The internet isn't so safe anymore now is it?
  •  
    This is really Carmen's bookmark. I inadvertently took control of it. Sorry, but I was trying to see if I could cache. It worked, but I ended up owning it. Ooops!
Ariel A

Skype security and privacy concerns - 1 views

  •  
    Skype is a software that enables online free instant messaging, video chatting and voice calling to anyone else that has Skype. Skype is a great resource for world conversations. The issue that Skype has are both security and privacy reasons. Skype is currently in the hands of ebay. Ebay is a well known site that allows people to buy items online and it some what reliable. The information that one would need to register in order to be a member of ebay and now Skype, one would need to place information stating, "Full name, User ID, Email address, Street address, State, City, ZIP code, Phone number, Country, Company, Password, Secondary phone number, Gender, Shipping information (including name, street address, city, state, ZIP), Bidding history on an item, Items for sale, Feedback left about the user, Bidding history, Prices paid for items, Feedback rating, Chat room and bulletin board posts" According to Ms.Brownstone in order for someone to find the identify of someone's personal information one would need the date of birth, and Zip code. What Ebay requires one to give out information is far more than what is necessary. One would question if they are really that reliable of a site. Skype claims that its reliable but we have to verification of evidence that it is indeed reliable. The security reasons behind Skype is that according to what i read, "Skype is an insistently closed program." This can affect the stakeholders which are the users of Skype to know if its a really secure website.
Madeline Brownstone

BBC NEWS | Programmes | Click | Biometrics to enhance security - 0 views

  •  
    With the growing number of stories about data being lost some institutions have been looking for a new more secure solution. Many are introducing a form of biometrics - a way of recognising something about you that marks you out as unique.
  •  
    With the growing number of stories about data being lost some institutions have been looking for a new more secure solution. Many are introducing a form of biometrics - a way of recognising something about you that marks you out as unique.
Jaymee C

I'm in Your Google Docs, Reading Your Spreadsheets - NYTimes.com - 0 views

  • There was a time when it would have taken a fair amount of criminal activity to get access to this much information about a company’s internal workings and Web site performance. Now an employee can accidentally drop it into the lap of a random outsider without even knowing that anything is amiss. That’s the power of cloud computing at work.
  • Sharing documents with your co-workers via Google Docs sure is convenient. It can also be hazardous. Make one little typo and your sensitive data could fall into the hands of… someone like me.
  •  
    This article is about a man who received spreadsheets and documents from a newspaper company that was not supposed to be sent to him but to an employee who had a similar name. The typo problem had caused a security issue to arise. The stakeholders include: the employee who sent the message, the man who received them and the company. The employee might have to be repremanded if the writer of the article were to use this information against them. In the same respect, the company would be in trouble if this information was very private and it we released to the general public. The fact is that the security of using googledocs is questionable if users are not careful.
Madeline Brownstone

BBC NEWS | Technology | US urges 'cyber hygiene' effort - 0 views

  •  
    Phishing attacks are specifically aimed at getting people to divulge personal information like social security numbers or bank details.
  •  
    Phishing attacks are specifically aimed at getting people to divulge personal information like social security numbers or bank details.
Madeline Brownstone

Healthcare Industry Turns to DeviceAnywhere to Bring their Products and Services to the... - 0 views

  • Quality of service can't be left to chance for any healthcare provider developing mobile applications.  However, this is especially true when the health insurance company is part of the largest single health carrier in the United States, providing health care services to more than 25 million consumers with a network of approximately 590,000 physicians and care professionals nationwide. For an organization of this size, they often select technology partners such as DeviceAnywhere, who share their company's commitment to excellence and innovation.
  • Not surprisingly, security and reliability resonate as two of the top priorities for Sensei Inc. as well.  As a provider of innovative mobile and Web-based solutions that prompt consumers at point-of-decision moments to make healthier eating, medical and lifestyle choices, Sensei relies on DeviceAnywhere to ensure that their consumers receive their personalized nutrition and health counseling on a consistent and confidential basis. After all, when customers count on Sensei mobile programs for critical reminders to take their medications or make on-the-spot decisions related to healthy eating choices, there is no room for error in downtime or compatibility issues between users' devices and networks.
  •  
    Not a legit news source, actually a puff piece for Deviceanywhere. However, it points to issues around mobile phone use in health services.
sarah d

What's Lurking in That RFID Tag? - 2 views

  •  
    After the professor of computer science and technical director of the Information Security Institute at Johns Hopkins University and his students broke the encryption of a popular RFID system in car keys, it was apparent that there is a security issue when it comes to the use of RFIDs. The stakeholders are consumers who use products that have radio frequency identification systems embedded in them. As seen from the experiment done by the professor and his students, people can have their cars broken if the encryption of this identification is broken. The area of impact is business because this identification is on items sold in stores. The IT system is RFIDs, which are radio frequency identification. These forms of identification are similar to bar codes because when scanned can show people the price of items. However, being more advanced, RFIDs also show what the item is, the trends in sales and much more.
Mohammad A

"1986 Privacy Law Is Outrun by the Web" - 0 views

  •  
    This article is about privacy issues within the Internet. As web services have improved, aspects such as spreadsheets, e-mail services and photography applications, the topic of privacy has now been "removed". The internet has been the leading factor in many issues with privacy. One of the main examples mentioned is the site WikiLeaks, which is entirely based upon a hacker who exposes the truth about everything and anything. Julian Assange is one of the leading activists who promotes free speech within the world to expose privacy. The IT system involved within this scenario is basically the data transfer through networks and servers online. The people who are being affected by this issue are those who's personal information is leaked (in any way, whether through WikiLeaks due to a political scandal or through hackers obtaining their information). Thus certain security measures are to be taken to prevent unwelcome access to personal and private information. For example, encryption is now one of the most famous and useful methods of preventing hackers from entering databases and other online servers. An encryption key allows for the safe keeping of personal information.
Jialin C

Twitter worm was unleashed by 17-year-old Australian - 1 views

  •  
    This article is about a 17-year old teenager had wanted to put Javascript code in a tweet. But then, others picked up the code and hacked Twitter by leading to viruses and pornography sites. It wasn't his intention to spread the worm to any users, but he wanted to see if it was possible to break the 140 words challenge on a tweet.
  •  
    This news post provides information regarding to three strands of the ITGS triangle. It's based on home and leisure and due to many privacy issues. Stakeholders are the Twitter users who have posted tweets and received viruses on their computers. Privacy and anonymity determines whether a user wants to post certain tweets regarding him/her and the anonymity would be how this teen had caused the spread of this worm onto other's computers which was a severe consequence for many. Tweets are meant to be secure, however any users that have accessed Twitter and clicked on the harmful link which have caused damages to their computers. The lack of security measure is terrible because it's suppose to prevent employess and users from having access to hacking; but it had done the opposite. The topic of people and machine is the benefit of Twitter. Users who have tweeted are somehow 'addicted' to posting personal information online and to their friends. It's a daily habit and a routine that most people do almost every five minutes each day. Twitter hits 50 million tweets a day and not only that, but people are very much attached to their cyber life nowadays. The internet is definitely not the safest place to talk about your daily life and the worm was spread across the cyberspace because of a advertisement that advertised for colored tweets on profiles, which was a mistake to click on.
  •  
    Poor guy! was my first thought, at the age of 17 and caused such a problem on twitter. This makes me think about how technology can go wrong so fast, which is why we shouldnt become so dependent on technology all the time! A simple java script on a tweet and bam! A worm was caught by all the other twitter users. And it wasnt even done intentiionally, imagine if it were done? The numerous things that can occur. Well thanks for sharing!
sarah d

AML Case Study: New Way to Fight Fraud - 3 views

  •  
    The IT system is the behavior-based software that uses artificial intelligence. the stakeholders are the bank implementing this software and the customers of the bank. The area of impact is business and employment, specifically banking. The issue with the use of this system is reliability. If this software is not reliable, then the customers at the bank are less protected from fraud. Also an issue that arises from the use of this system is security. The use of this system is to protect against fraud. However, if the computer becomes insecure, fraud would not be detected. 
  •  
    This is a really interesting case. Although it's not robots that one can see that are being used, banks are using artificial intelligence to help them recognize patterns and catch fraudulent people. Small banks are the real stakeholders in this case, and they want to protect their customers and their finances. The automation of the fraud-catching has given the banks more time and makes it easier to handle all the paperwork necessary for a case.
Kristin O

Poker Bots Invade Online Gambling - 6 views

  •  
    This article starts out with a scenario about a professional online poker player figuring out that he was actually playing against a bot, which is designed to beat its opponents against all odds. There area of impact of this article can be arts entertatinment and leisure because the players do play for money and compete with one another online. This is from the point of view from the players however it can be also seen as business and employment because bots are being sold on line to do this specific task and to win earnings for whoever has paid for them. The Social and ethical issues here can be Security when looking at it from the point of view of the poker site owner, they are supposed to try and root out any bots to make online playing fair for everyone else. People and Machines can also be applied here because the bots are taking something that is meant for recreation by humans and extending their faculties but to the extent of not playing by the rules and playing an unfair game with some one else. The stakeholders of this issue are the online poker players, the people who own the poker playing website and the people who sell and use the poker bots. The IT system referred to in the article are the bots.
  •  
    I found this article really interesting because I had not thought about it at all. This is an important case to pay attention to because of the fact that machines are taking over another aspect of the human life. Not only are machines capable of replacing jobs, such as the repetitive ones in factories, but they are also able to take away the fun in gambling. They are also bending the rules and creating an unfair environment for gamblers on the Internet.
  •  
    This article piqued my interest because it made me think about my own article in a broader way. My article talked about the issue of artificial intelligence talking menial and low skill jobs from people. This article attracted me because it show AI used in another way to make money for people. It takes what is mentioned in my article and extends it to another dimension. People are using these bots to actually make money by competing against human competitors but this is occurring to players unsuspecting players, technically this is using advanced technology to steal.
1 - 20 of 31 Next ›
Showing 20 items per page