Skip to main content

Home/ Globaltech/ Group items tagged and

Rss Feed Group items tagged

anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Unmanned aerial warfare: Flight of the drones | The Economist - 7 views

  •  
    Summarize m12 nov 2 az
  • ...1 more comment...
  •  
    On September 30th, a missile strike launched from a UAV killed Anwar al-Awlaki, al-Qaeda's most effective propagandist. This was an example of how the UAV are changing today's combat. These babies are equipped with sophisticated sensors and carry Hellfire missiles and laser-guided bombs. There may not be a man in the cockpit, but each Reaper UAV requires more than 180 people to keep it flying. A pilot is always at the controls from a ground control unit and another officer operates its sensors and cameras. UAV have become the weapon of choice over the past decade. Theres not a month that passes without reports that an al-Qaeda or Taliban leader has been killed by UAVs. There are more hours flown by America's UAS than by its manned fighter jets and more pilots are being trained to fly them than their manned equivalents. The frequency of drone stikes on terrorists in Pakistan has rose from one every 40 days to one every four days under Obama's admin. The UAV's ability to loiter for hours, minutely observe human activities while transmitting full motion video to its ground crews and can strike with pinpoint accuracy has made it the essential weapon in America's war on terrorism. Drones come in many different shapes and sizes. Predators and Reapers are the larger and more popular ones. Some are micro sized devices that imitate a bird used for eavesdropping or a mid sized plane that can be hand launched by soldiers to tell them what is happening over the hill. The medium sized UAVs would be able to defend airspace against enemy intrusion to attacking enemy air defenses. The largest UAV would operate as airborne warning and control, aerial refueling tankers, lift transports and long range bombers. The next generation of drones will also have AI, which allows them to shoot to kill. The UAS are used for "dull, dirty, dangerous, difficult or different" tasks. These tasks include surveillance missions requiring time and a degree of persistence that crews of
  •  
    manned aircraft couldn't provide. Also, UAS could be used to fly in to observe or take samples after a chemical or biological attack. Any missions too dangerous for manned aircraft will be taken care of by the UAV. UAV have other advantages over manned aircraft as they have more detailed information about their targets, their strikes are more accurate and cause fewer civilian casualties. They are also cheaper and smaller. Since they have no pilot, the space could be used for fuel and thus they can fly much longer than manned aircraft. Without the need to accommodate crew, drone can be given radar-cheating stealthy shapes and can maneuver better. There are however a problem afflicting the drones as they depend on two-way satellite communications. If the datalink is broken the remote pilot will lose control of the aircraft. For missions requiring constant oversight, the vulnerability to electronic jamming or a direct attack on a communications satellite is a huge problem. Another problem is that the dones has a slight delay between the remote pilot and the aircraft. To reduce latency, small, solar, or laser powered ultra long endurance drones can form a chain in the sky along which satellite signals can be bounced. To reduce the workload on pilots, big UAV can take off and land automatically. The US Air Force plans to have a pilot operating up to four drones at a time. Civil liberty advocacy groups have raised concerns about targeted killings by drones. Bus as long as a UAS pilot can trust data from remote sensors, he or she should be able to make a proper assessment the same ways as the pilot of a manned aircraft. UAS pilot will be in a better position to do so since he or she will have more time to assess the situation accurately and not be exhausted b the physical battering of flying a jet.
  •  
    Allowing the UAV to fire a weapon based entirely on its own data analysis raises a lot of ethical problems. Using UAV to kill enemies thousands of miles away is like a cowardly action of a bully sheltering behind superior technology. There are fears that UAS will lower the political threshold for fighting and an essential of restraint will be removed. Drones make leaders fonder of war.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

Learning The Right Lessons From The Amazon Outage - 5 views

  •  
    Define: AWS Iaas Define and describe: Free redundancy rapid scalability server failover maintainability Explain each lesson and determine whether you agree or not with each one. May 13 az
  •  
    1) Define: AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
anonymous

Blogs Wane as the Young Drift to Sites Like Twitter - NYTimes.com - 7 views

  •  
    Go to each link in the article and describe it. march 3 Nat
  •  
    Facebook : It is the world's largest social network site, which was founded in 2004 by Mark Zuckerberg. It has become a very developed source on the internet, where users can like, share, comment on something without leaving the web page that they were at. There are approximately 500 million users worldwide. Twitter : Twitter is a social networking site that was started up by a group of 10 people called Obvious, and it has become popular for its simplicity of "micro-blogging" where a twitterer or tweeter sends short messages called tweets, within 140 characters, and are shared with people that follow you, and to the public. Pew Research Center- It is a research center for the people and the press, and it is an independent, non-partisan public opinion research organization that studies attitudes toward politics, the press and public policy issues. Huffington post : Huffington post is a news website that began in 2005, and it has become the most heavily visited news web sites in the country. BlogHer : is a group blog, online community, and refers to an annual blogging conference for woman.  Lisa Stone, Elisa Camahort Page and Jory Des Jardins founded BlogHer in 2005 in response to the question, "Where are all the women bloggers?" Tumblr : Tumblr was founded in 2007 by David Krap, and it is a social networking site that allows user to post text, images, videos ,links, quotes and audio, which can be reblogged by other users who follow your blog. Google : Google was founded in 1998, and is known as the world's most popular internet search engine. Google hosts and develops a number of internet-based services and products,and generates profit primarily from advertising through its AdWords program, which has helped them earn huge profits for their company. LiveJournal : LiveJournal is a virtual community where Internet users can keep a blog, journal or a diary. LiveJournal is also the name of the free and open source server software that was desig
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
anonymous

Net Cetera - OnGuard Online - 0 views

  •  
    Read Heads-up. Describe two guidelines from each section that you think are relevant advice. May 9 kuni
  •  
    Share with care Your online actions can have real-world consequences. The pictures you post and the words and the words you write can affect the people in your life. Think before you post and share. The advice, mainly for children, is that before you click to send email or when you're ready to post or send a message or a photo, download a file, game or program, or shop for something-stop for a second. Think about things like: Do you know and trust who you're dealing with-or what you're sharing or downloading? How will you feel if your information ends up somewhere you didn't intend? Get someone's okay before you share photos or videos they're in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy-and other people's-before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Interact With Tact Avatars are people too. When you're playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH TACT like you would in person. Remember that your character or avatar is a virtual version of you-what does it tell people about you and your interests? Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. The Protection Connection Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends-and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

Control these large smart appliances with your iPhone | Appliances - CNET Reviews - 1 views

  •  
    Describe IT Dawoon Oct 2
  •  
    Most smart appliances have an accompanying application. Those applications are available on iOS and android. (Samsung's washer and dryer application is working on only iOS and Samsung's Galaxy mobile devices, not the rest of the Android devices.) There are some examples of using iOS to control the smart appliances 1. LG Smart ThinQ LFX31995ST LG Smart ThinQ app will tell you the internal temperatures of both the refrigerator and freezer, and whether it's on energy-saving mode or not. You can make grocery lists and automatically update your inventory once you've checked an item off the list. Also, you can search for recipes on the fridge based on what your fridge has in stock. 2. Whirlpool WRL767SIAM Side-by-Side Refrigerator with 6th Sense Live it transmits information directly to the free app on your smart device. Whirlpool's app can let you know, if the refrigerator door is open or if there has been a power outage. Whirlpool has also enabled this refrigerator to connect to the smart grid if it's available in your area, which will let you monitor energy usage through its app. 3. GE Profile PT9550SFSS Built-In Double Convection Wall Oven The game-change app turns your phone into a remote control for the oven. You can set the temperature, mode, and time for both ovens independently and turn them on with app. 4. LG Smart ThinQ LRE3027ST oven Smart ThinQ app will allow you to search for recipes and then cue up the cook time and temperature accordingly, but you still have to manually press start on the oven itself. LG app allows you to run diagnostics on the range to make sure that everything is running as it should be. 5. LG Smart ThinQ WT6001HV Washer/Smart ThinQ DLEX6001V Electric Dryer LG's Smart ThinQ washing machine features a gorgeous touch screen and connects to LG's Smart ThinQ app via your smartphone or tablet. It doesn't have a smart-grid function like some other washer/dryer apps, but it's otherwise similar in that it lets you check your wash cycle
anonymous

Book Review - The Net Delusion - By Evgeny Morozov - NYTimes.com - 3 views

  • the ­asocial pursuit of profit is what drives social media
  • more capricious technology” than radio or television
  • capricious technology” than radio or television. Neither radio nor TV has “keyword-based filtering,” which allows regimes to use URLs and text to identify and suppress dangerous Web sites, or, like marketers, to collect information on the people who visit them
  • ...5 more annotations...
  • “Technology changes all the time,” he writes, “human nature hardly ever.”
  • Mass journalism and democracy are inextricably entwined
  • The Net Delusion
  • Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters
  • For more on “The Net Delusion,”
  •  
    Feb 22 Does the Net allow more freedom or does is it a tool for governments and business to control us? Jenny
  •  
    1.7_surveillance 2.6_pol_gov 3.4_internet
  •  
    Does the Net allow more freedom or is it a tool for governments and businesses to control us? The Net allows both. The users can roam freely to their discretion where and what they want to put onto the web. It is just a matter of a country censoring the content, or the user self-censoring what is to be put on the web. Also, the governments and businesses both can use the Net to their advantage. The government can learn and find out various information of various individuals and trends of the public through the Net's social networking websites and other portal that have discussion between citizens themselves. Business are able to keep track of trends to see what is happening, such as the stock prices to what people like to eat, listen to, what they like to use. Thus the businesses are able to stay in business a little easier through knowing the information from the web. The businesses can also advertise themselves through the net, and that way, it is actually faster than having actual offline campaigns and advertisement. Therefore, the net can allow us both. We are free to use it more than let it control us. It's just a matter of fact that higher class society, social ranking, or economic status-ed has more chances to controlling the net due to their connections with the higher ups. Yet, censorship and surveillance is everywhere, and thus doesn't allow absolute freedom.
anonymous

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 10 views

  •  
    List the precautions Mr. Lieberthal takes when visiting China. Define digital espionage. Why is it easy to steal information remotely? How was the US Chamber of Commerce hacked? Explain the reason for thwarting the cybertheft of trade secrets. all feb 16 soo paulo
  •  
    List the precautions Mr. Lieberthal takes when visiting China. * He leaves his cellphone and laptop at home. * He brings "loaner" devices. * He erases information before and after the trip. * He disables Bluetooth and Wifi. * He turns off his phone, and takes the battery out. * He only connects to the internet through an encrypted password protected channel. * He copies and pastes his password from a USB. Define digital espionage. Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen. Why is it easy to steal information remotely? Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information. How was the US Chamber of Commerce hacked? The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber. Explain the reason for thwarting the cybertheft of trade secrets. Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
anonymous

Why Did Newspapers Take So Long to Copy Groupon? - BusinessWeek - 3 views

  •  
    brief analysis Make sure to describe major terms, like groupon and livingsocial. march 7 woo
  •  
    1. Identify the area of impact the scenario relates to. Business, E-commerce 2. Identify the main stakeholders to the IT system. Online Newspaper companies, newspaper subscribers 3. Identify one ITGS social/ethical concern in the article. Globalization 4. Describe ITGS terminology and systems. - Groupon: a deal-of-the-day website that is localized to major geographic markets worldwide. Launched in November 2008, the first market for Groupon was Chicago. - LivingSocial: an international social buying company based in Washington, D.C. They specialize in daily deals offered in cities across the United States, as well as in Canada, Europe and Australia. - TimeLiimited: is a service just like Groupon, which emails its readers on special offers for travel and living terms The New York Times newspapers are going to start using the internet, and connection of the companies to its subscribers for a fee to their advantage, even though there is a slim chance now. It is the spread of public communication of news, the latest trends, and discounts to events and merchandise while connecting directly to personal communication means of its subscribers (through their e-mails). 5. If possible, describe a solution to the concern (issue). Straightforward copying Groupon is not the answer for the success online. The New York times might be able to have a chance against Groupon and LivingSocial, but these two big groups have already topped the business of connecting companies with deals to its customers and subscribers for a fee. The companies should be able to manage connection between merchants and their customers. The New York Times would have to come up with special deals that appeal to users, such as a subscription discount, so on, and so forth to grab customers' attention from Goupon and LivingSocial to the New York Time's TimesLimited. The process involves sending people e-mail offers and discounts from companies and service providers, then charging a fee for
anonymous

Your smartphone: a new frontier for hackers - Technology & science - Security - msnbc.com - 15 views

  •  
    Describe the different ways that iphones and android phones are being hacked. all sept 5 soo
  •  
    Malicious Applications that log details about incoming/outgoing phone calls, as well as recording the calls. They can create unwanted service charges subscriptions to phone users. The users may or may not even receive the "service" that was subscribed, and paid for. They cab intercept text messages, compromise emails, photos and private content. Malicious applications that appear to be games, calculators, or pornographic photos and videos are downloaded to smartphones. Malware that replies incoming text messages with spam links. E-mail based phishing - because the phone screens are smaller than computers, it is harder to tell apart phishing links and scams in the url. iPhone's unencrypted file of location logs for iPhone users. Jailbroken iPhones that run unauthorized content is also a gap where malware can get through. Because these apps are unauthorized, they haven't gone through Apple's authorization process, and can contain malware, and can hack the user's phone. o By Malicious Application= The Applications which Apple and Android offers to customer, sometimes have malicious worms or viruses. Sometimes, malicious applications masquerade to games, calculators, or pornographic photos and videos. Hackers made their own malicious app and phishing people to download. The payment will charge to the victim's phone bills. o By Phishing Texting= Personal texting sometimes contain spam and malicious links which lead to the hacking site o By Advertisement link= Viruses might attach to the advertisement link o By Weak Security= Weak security of iPhone and Android phone therefore, find the weak part of the phone and hack. o By E-mail= Users tend to be less caring on phones, as the words and the screen itself are small
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

US Report Blasts China, Russia for Cybercrime - ABC News - 15 views

  •  
    Identify the issue and scenario. Describe 3 incidents of cyberattacks by China. List some of the most desired data. Describe how the US is responding to these cyberthreats. all nov 10 kuni
  •  
    Identify the issue and scenario. China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies. Describe 3 incidents of cyberattacks by China. 1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists. 2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company. 3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies. List some of the most desired data. Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts. Describe how the US is responding to these cyberthreats. The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
anonymous

China Tightens Electronic Censorship - NYTimes.com - 2 views

  • A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger
  • LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said
  • China’s censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary — like bans on Facebook, YouTube and Twitter — are now considered permanent. Government-friendly alternatives have sprung and developed a following
  •  
    This is similar to the Google accuses China... article and will help with the answers. Describe VPN. How does a proxy work? List a proxy you find useful. When would you use a proxy? Explain: Google has "played a role in manufacturing social disorder". march 25 Azman
  •  
    Describe VPN. A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet. How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946 List a proxy you find useful. Tor Trycatchme anonsafe When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information. Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
anonymous

Internet blackouts: Reaching for the kill switch | The Economist - 2 views

  • cost Egypt as much as $90m
  • enforced closure of the internet can backfire
  • crudely disconnecting cables risks outrage elsewhere
  • ...2 more annotations...
  • And cutting international cables leaves a country’s internal connections intact
  • Egypt’s blackout had plenty of chinks
  •  
    What were the chinks in the blackout? What are problems with cutting national and international cables? Explain the possible financial impact of blackouts. How can a blackout backfire? march 11 kuni
  •  
    What were the chinks in the blackout? Many people abroad offered the Egyptians internet though the terrestrial phone system, which was basically a dial-up system. Moreover, Google and Twitter launched a service where users can voicemail their tweets, which is then converted into text, to publish their tweets online. What are problems with cutting national and international cables? It will cost a lot in budget and maybe some damage too, because it is complex and expensive to build and run a kill switch. Explain the possible financial impact of blackouts. The financial, impacts the finance of the blackouts are that money transactions and deposits are affected by the suddenly cut line, which may cause problems to both local individuals as well as large companies that are trying to seal a business deal between each other. An intergovernmental think-tank in paris predicts that the cost of damage in Egypt for its network shutdowns was around $90million. Also, other international countries that are trying to invest in the country that has a blackout are most likely to rethink their decision, and take their investing plans to another more stable country. This affects the country as the whole since they will be losing investors in their country. This would also affect the economy as rates change, the amount of people (tourists) flowing in and out of the country including business groups. How can a blackout backfire? A blackout can backfire its government because it can cause the citizens to view the government's act in a bad way. Cutting of connections will people will stop trusting its government, and would want to overthrow their leader/government. Moreover, This is somewhat a loss for the government. They wouldn't want their citizens to go up against them. Thus, citizens play a major role on how a blackout can backfire. The cutting internet doesn't help at all.
anonymous

When Passwords Aren't Enough: The Need for Strong Online Authentication That is Easy to... - 2 views

  •  
    Describe the IT terms. april 28 kuni
  •  
    Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain. Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
1 - 20 of 266 Next › Last »
Showing 20 items per page