Skip to main content

Home/ ITGS News/ Group items tagged security

Rss Feed Group items tagged

Kristin O

Poker Bots Invade Online Gambling - 5 views

  •  
    This article starts out with a scenario about a professional online poker player figuring out that he was actually playing against a bot, which is designed to beat its opponents against all odds. There area of impact of this article can be arts entertatinment and leisure because the players do play for money and compete with one another online. This is from the point of view from the players however it can be also seen as business and employment because bots are being sold on line to do this specific task and to win earnings for whoever has paid for them. The Social and ethical issues here can be Security when looking at it from the point of view of the poker site owner, they are supposed to try and root out any bots to make online playing fair for everyone else. People and Machines can also be applied here because the bots are taking something that is meant for recreation by humans and extending their faculties but to the extent of not playing by the rules and playing an unfair game with some one else. The stakeholders of this issue are the online poker players, the people who own the poker playing website and the people who sell and use the poker bots. The IT system referred to in the article are the bots.
  •  
    I found this article really interesting because I had not thought about it at all. This is an important case to pay attention to because of the fact that machines are taking over another aspect of the human life. Not only are machines capable of replacing jobs, such as the repetitive ones in factories, but they are also able to take away the fun in gambling. They are also bending the rules and creating an unfair environment for gamblers on the Internet.
  •  
    This article piqued my interest because it made me think about my own article in a broader way. My article talked about the issue of artificial intelligence talking menial and low skill jobs from people. This article attracted me because it show AI used in another way to make money for people. It takes what is mentioned in my article and extends it to another dimension. People are using these bots to actually make money by competing against human competitors but this is occurring to players unsuspecting players, technically this is using advanced technology to steal.
Rubayeth M

Are local solutions the future for government IT? - 0 views

  •  
    Damian Green a person who insists not giving their medical information to Google Health and Microsoft Vault.
Mohammad A

"1986 Privacy Law Is Outrun by the Web" - 0 views

  •  
    This article is about privacy issues within the Internet. As web services have improved, aspects such as spreadsheets, e-mail services and photography applications, the topic of privacy has now been "removed". The internet has been the leading factor in many issues with privacy. One of the main examples mentioned is the site WikiLeaks, which is entirely based upon a hacker who exposes the truth about everything and anything. Julian Assange is one of the leading activists who promotes free speech within the world to expose privacy. The IT system involved within this scenario is basically the data transfer through networks and servers online. The people who are being affected by this issue are those who's personal information is leaked (in any way, whether through WikiLeaks due to a political scandal or through hackers obtaining their information). Thus certain security measures are to be taken to prevent unwelcome access to personal and private information. For example, encryption is now one of the most famous and useful methods of preventing hackers from entering databases and other online servers. An encryption key allows for the safe keeping of personal information.
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
Ariel A

Skype security and privacy concerns - 1 views

  •  
    Skype is a software that enables online free instant messaging, video chatting and voice calling to anyone else that has Skype. Skype is a great resource for world conversations. The issue that Skype has are both security and privacy reasons. Skype is currently in the hands of ebay. Ebay is a well known site that allows people to buy items online and it some what reliable. The information that one would need to register in order to be a member of ebay and now Skype, one would need to place information stating, "Full name, User ID, Email address, Street address, State, City, ZIP code, Phone number, Country, Company, Password, Secondary phone number, Gender, Shipping information (including name, street address, city, state, ZIP), Bidding history on an item, Items for sale, Feedback left about the user, Bidding history, Prices paid for items, Feedback rating, Chat room and bulletin board posts" According to Ms.Brownstone in order for someone to find the identify of someone's personal information one would need the date of birth, and Zip code. What Ebay requires one to give out information is far more than what is necessary. One would question if they are really that reliable of a site. Skype claims that its reliable but we have to verification of evidence that it is indeed reliable. The security reasons behind Skype is that according to what i read, "Skype is an insistently closed program." This can affect the stakeholders which are the users of Skype to know if its a really secure website.
Jaymee C

I'm in Your Google Docs, Reading Your Spreadsheets - NYTimes.com - 0 views

  • There was a time when it would have taken a fair amount of criminal activity to get access to this much information about a company’s internal workings and Web site performance. Now an employee can accidentally drop it into the lap of a random outsider without even knowing that anything is amiss. That’s the power of cloud computing at work.
  • Sharing documents with your co-workers via Google Docs sure is convenient. It can also be hazardous. Make one little typo and your sensitive data could fall into the hands of… someone like me.
  •  
    This article is about a man who received spreadsheets and documents from a newspaper company that was not supposed to be sent to him but to an employee who had a similar name. The typo problem had caused a security issue to arise. The stakeholders include: the employee who sent the message, the man who received them and the company. The employee might have to be repremanded if the writer of the article were to use this information against them. In the same respect, the company would be in trouble if this information was very private and it we released to the general public. The fact is that the security of using googledocs is questionable if users are not careful.
Alex F

Regulations and Security Concerns Hinder Asia's Move to Cloud Computing - NYTimes.com - 0 views

  •  
    In this article it talks about how the organization known as "The Youth Olympic Games" were hosting their games in August. But they have done something different this year. Unlike what they have done every year, purchasing their items all the time and selling them or giving them away for free; they have now would have an third-world country who has the equipment do their job if they were to buy it. By that I mean they would used a system called "cloud services", and the group in charge of working would be Asia and they would have the data of everyone who is watching, performing and workers of the organization.
    Therefore these are the stakeholders in with this program that because they are having someone else from a different country; without knowing if they are someone who wants to steal their identity has full access.
    The IT system in this "cloud services" would be cloud computing since someone that may be from home, or sitting in an office has control over the organization and the data. The issue in this would be security, that because the people that are using "cloud services" are in Asia; therefore they are in a different having control in the U.S.
    The scenarios in this would be the fact that everyone identity would be stolen since the controls would be in Asia and they wouldn't be tracked since they are in a different country. They also couldn't be charged since they were given permission to have access to the data.
Rubayeth M

Ohio bans offshoring as it gives tax relief to outsourcing firm - 2 views

  •  
    In Milford, Ohio the governor Ted Strickand is trying to stop all outsourcing because his two major reasons are the "threat of of a job but an IT security risk." Then it goes more deep saying how more than 90% of the workers are Indian and 7% and lower have job in America. Strickland is more concerned with the issues which are jobs, data security, privacy,and identity theft risks.
sarah d

What's Lurking in That RFID Tag? - 2 views

  •  
    After the professor of computer science and technical director of the Information Security Institute at Johns Hopkins University and his students broke the encryption of a popular RFID system in car keys, it was apparent that there is a security issue when it comes to the use of RFIDs. The stakeholders are consumers who use products that have radio frequency identification systems embedded in them. As seen from the experiment done by the professor and his students, people can have their cars broken if the encryption of this identification is broken. The area of impact is business because this identification is on items sold in stores. The IT system is RFIDs, which are radio frequency identification. These forms of identification are similar to bar codes because when scanned can show people the price of items. However, being more advanced, RFIDs also show what the item is, the trends in sales and much more.
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Kristin O

BBC NEWS | Technology | Consumer concern over RFID tags - 1 views

  •  
    This article talks about the security concerns that the customers of a supermarkets have with the use of RFID technology. They feel that the RFID technology is to invasive and can be used to track where abouts of items after they have been purchased at the store.
Karen M

Visa Introduces a Credit Card on a Phone - NYTimes.com - 1 views

  •  
    In this article, RFID is being used in the business world. People are now able to purchase phones with the capability of making purchases by moving it over the terminal. RFID technology allows people to stop using credit cards, making the process of buying something even more convenient. The stakeholders are the credit card companies, the people using this new technology, and the stores with the terminals that read RFID. Credit card companies need to have a good security system to ensure their customers and users that their information will be kept safe on the RFID chip. The people who are switching to this new technology are risking their private information for convenience. The stores with these new RFID terminals are also risking their customers' private information because there is a possibility that their system could be hacked. The area of impact is Business and Employment. Businesses are switching to this new technology because it is convenient for them as well as their customers. The main issues that arise from using RFID are security and reliability. The RFID terminal needs to be reliable so that every customer is able to use the RFID chip on their phone to make purchases. The security issue is that a hacker may be able to get into the system to read customers' private information. It may also be possible for a hacker to carry around a portable terminal that would be able to store people's private information on it for future usage. The security system described in this article sounds like a good start, but more needs to be done to keep up with the technology that is growing along with it.
Rubayeth M

New Hospital Tagging System Should End Patient Mixups - 0 views

  •  
    At the NHS in England, hospitals are using these new "IT programme" telling them to start labeling their patients. In 2006 approximately 25,000 patients were saying that they they weren't given the right treatment. These were cases due to the misreading of the patient's tags, papers and other identification papers.(These misreadings were due to the legibility of the handwriting.
    Then the idea of barcodes and RFID were introduced this February by the UK healthcare manager, Roger Lamb who is now using this NHS 10 digit patient ID number and RFID tags which will modernize the NHS hospital in England. RFID's will be upon their wristband which will contain all their personal records (there will also be a photograph if the patient is unable to speak). This can only be accessed by the doctors from his/her PDA.

    2.4_health
    3.1_hardware: RFID and 10 digit barcodes
    3.7_databases: that holds patient's records

    (Keep in mind this article was written in 2007.)
Elisavet M

TECHNOLOGY; Companies in Radio Tag Business Broaden Legal Dispute - 0 views

  •  
    Discussion about the agreement to integrate the new process of product tracking in company supply chains (RFID technology), continues to widely expand and challenge the business mentality as it has become reinforced by major companies such as Wal Mart and the Defense Department. A dispute transpired between two alliance companies, Symbol (a leader in bar code systems) and Intermec, as both were unable to consider possessing concurrence upon licensing proposals for RFID technology usefulness. Initially, Intermec Technologies, accused Symbol of infringement transgressions in regards to six Intermec patents that were being sold by Symbol; such products included the utilization of RFID technology, an investment that was supported upon by both business partnerships. Such accusations had been followed after Symbol had also charged Intermec for infringing patents including Wi-Fi technology. The issue of integrity as well as reliability resurfaces in this particular case, directly conveying the disadvantages of business collaboration, that must embed mutuality in justly managing shared information, equality of confidentiality and a clear understanding about each businesses' ideas and plans for profit purposes. It is significant to have fluidity in exchanging perspectives, in order to establish a solid foundation of trust that stands as a promise to future investments and processes.
Ram Bhadra

Usage of weak encryption codes in RFIDs - 0 views

  •  
    In big corporations such as Wal-Mart, the use of RFIDs has increased, but the disadvantages of RFID is now a serious issue. With the use of RFIDs on items, the customer is able to avoid waiting at a register, and the RFID will charge the person's credit-card. Yet the tags embedded in the items bought, such as clothing, can be tracked down by the store management systems, risking customers' security and privacy. Since RFIDs do not require a power supply or batteries to operate, all that is needed is a wireless scanner, which Wal-Mart's managing system uses to keep track of the items. Privacy has now become a major issue within the use of RFIDs for many Wal-Mart customers. Also, in many credit cards and "gas-cards", RFIDs are being used, yet the information on the tags also stays within the system. At airports, many modern passports are now using RFID tags that can be scanned from a range as far as 30 feet. Thus this results in chaos for the passengers, and an issue in being able to control the airport security properly.
  •  
    Large scale businesses like Wal-mart and government authorities in passport make use of sophisticated RFIDs which make the data stored in them or to be accesses through them safe, which helps them keep their business data or data of the clients(in some cases passport holders) safe, however many corporates make use of cheap RFIDs which have a weak encryption code to protect them. This code can be broken easily and hence the client of that RFID is vulnerable to hackers. Ford for example makes use of RFIDs manufactured by Texas Instruments, in their car keys. These RFIDs are protected by very weak codes, hence it is easy for thieves to break the code and steal cars.
Carmen M

RFID security, data protection and privacy, health and safety issues - 0 views

  •  
    This was a rather long but interesting article to read regarding RFID. It starts out by stating what RFID is and how it is being planned on being introduced across many stores. What made this article informative was that it discussed not only the first thing that comes to mind when we hear this, privacy and security, but also possible health and environmental issues. Security was a big issue discussed. Concerns that came up was who would manage the information picked up by RFID's? Can this be used to track people? Can personal items or documents integrated with RFID track a specific person? Would they know? To what extent does this violate privacy? Are there laws to prevent any form of privacy violation? The article also stated people might have a choice whether or not to use the RFID and what would be the other option.
    Another issue stated was a health issue. Since this uses radio frequency waves, can this pose any damage to lets say tissue cells? The hypothesis was that no because it uses different kinds of waves than other technologies. However, this technology is too early in its stage to know for sure.
    Another concern was the disposal of this technology. What effect would it have on the environment. Again, it was too early to determine for sure.
Elisavet M

"China defends internet censorship" - 3 views

  •  
    Chinese government refuses to fully admit the extent of internet censorship enforced within the country, expanding beyond the realm of securing internet browsing in order to prevent pornographic sites and other inappropriate or harmful content. Government officials state that political enforcement for internet censorship, does not suppress the human rights of individual expression on the internet. However, many organizations and groups do argue that Chinese efforts to regulate the data being seen is aimed upon preventing perspectives of the public to be heard through the web.
Mohammad A

iPhone takes a trip to \"return to sender\" - 1 views

  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    Chinese people wait in line for each of the new Apple iPhone releases, buy them at premium price of $600, and send it back to where it was made to get it unlocked.
  •  
    This article meets the requirements for an IT article because, to begin with, it discusses one of the main IT systems, the cellphone (a sophisticated phone such as the iPhone however). It is reliable because it comes from a new source such as the New York Times, which has a reputation of giving reliable information to its readers. The time that the article was written is as recent as can be (less than 24 hour news, meaning that it involves one of the main issues and impacts that affect society on a greater scale today). There are stakeholders involved - the people responsible for the social/ethical issue(s), the people being affected by it, and the people becoming involved as a result of the impacts of these issues. Therefore it can be stated that this article meets all the requirements for ITGS.

    The social and ethical issues that result from this IT situation are significant to what it led to. One of the main issues that revolves around this issue is the digital divide and equality of access. Once the iPhone is "unlocked", the user has access to many digital streams of data; data in which regular iPhone users do not have access too, or they are unable to stream it. Integrity is also one of the main social and ethical issues; the IT device in question (an Apple iPhone) was "tampered with" and has therefore lost most of its value as well as its originality. People and machines, although it is a social and ethical issue that affects almost all IT systems, it can also be said that it is relevant to this situation as well. The people who are unlocking the iPhone are on this "digital treadmill" in which their life revolves around the database and access to digital information. Information that is so immense and updated so quickly that it can be overwhelming sometimes, yet provide the user with an extensive amount of knowledge, which is often put into good use.

    The specific scenario that this IT system and its impacts are based upon is politics and government. The act
Ram Bhadra

Cyber Command chief proposes secure network for government, key industries - 0 views

  •  
    The main stake holders in this articles are the Military, FBI, the government and all foreign surveillance. The technology involved is the military database. It has many important details and high level data that would be harmful if in wrong hands. The government needs to secure the data base to avoid in foreign invasion on their database hence this would pose a serious threat to the nations security. The first step in securing the government database is to take it off the main internet and hence there would be no way to access it unless if an individual or an organization had authorization to it.
1 - 20 of 48 Next › Last »
Showing 20 items per page