Skip to main content

Home/ Groups/ ITGS Security
ranahijazi

Article 4: Web Cameras - 0 views

  •  
    Question: What other applications could home security be used for? Home security can be used to surveil your own family. For example, if I have to go out to work, I can install some cameras in my house to check that the children are ok and that nothing is wrong. In case of fire, the cameras can send the e-mail to me and then I call the firemen. There are other dangerous that can be detected by home security, like explosions, black outs, and environmental problems.
ranahijazi

Article 3: Facebook Flaw - 0 views

  •  
    Question: Facebook and other social media sites have had security flaws in the past. They have subsequently been displayed as 'villain's by the mass media. Is this a fair accusation? Why or why not? No, because the fault is of the hackers in the first place. Then, all the security systems can be vulnerable; even if a security system is very strong, hackers are always able to find a weak point. But this not justify Facebook entirely because, like many people said, it has a low quality of protection and these problems were defined "embarrassing security flaw". At least Facebook has immediately solved the problems, instead of Sony that took one month and it still have some difficulties.
ranahijazi

Article 2: Hack Attacks - 0 views

  •  
    Question: It is evident that car control system can be hacked and controlled. As such, do you think such systems are safe? Why or why not? No, because these systems are too easy to hack. Experts said that is not a problem to hack everything in a car, so engine, breaks, heating and cooling, instruments panel, radio and locks are all vulnerable.
ranahijazi

Article 1: Sony - 0 views

  •  
    Question: Is there anyway that Sony could have foreseen this breech of security and thus prevented it? An hacker attack to Sony was predicted from many people. Some experts informed Sony about the low quality of protection and that the hackers were able to break all Sony activities (like play station network and Qriocity). Also Firewall was missing. It was possible to avoid that disaster. Sony should use the similar kind of protection as Microsoft. All Sony servers were offline for one month (the hack attack happened in 20th April 2011), but now it's everything online expect for Asia, where the government wants to test the new security systems of Sony. The new security systems of Sony are still quiet easy to break, for example yesterday (May 23rd) some crackers stole data and codes of the users of Play station Network.
ranahijazi

Security Notes - 0 views

1.2 Security Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certa...

#notes#security

started by ranahijazi on 16 May 14 no follow-up yet
ranahijazi

What do I need to know about Security? - 0 views

Security advice and information Authentication (passwords and biometrics) Social engineering Hacking Phishing Spam Cyber-warfare and cyber-terrorism Malicious software Encryption Wireless security ...

#security#subtopics

started by ranahijazi on 16 May 14 no follow-up yet
ranahijazi

Social and Ethical Issues in Security - 0 views

From the ITGS Guide: Security refers to the protection of hardware, software, machines and networks from unauthorized access, alteration or destruction. Security measures include restricted access ...

#social#ethical#issues

started by ranahijazi on 16 May 14 no follow-up yet
ranahijazi

Security Terms and Quiz - 0 views

  •  
    This website provides you with the essential Security terms and allows you to take a quiz, giving you feedback on your progress. If you have any questions regarding the terms, feel free to comment!
1 - 8 of 8
Showing 20 items per page