Skip to main content

Home/ Globaltech/ Group items tagged banking

Rss Feed Group items tagged

anonymous

Bank app users warned over Android security | IT PRO - 4 views

  •  
    Mobile apps provided by mobile operators and handset manufacturers could put expose phone users to fraud, according to research that as many as 64 per cent of manufacturer added applications were exposing users to serious security issues.
  •  
    "Bank app users warned over Android security" Describe at least four types of vulnerabilities. Describe mobile point-of-sale devices. Explain why card fraud could endanger the payment chain.
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
Alex Lenk

BBC News - Australia's central bank targeted by hackers - 2 views

  •  
    Eun Young  October 17th  BAA
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to is 'business and employment'. 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers. 3. Identify and describe one ITGS social/ethical concern in the article. The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system. 4. Describe ITGS terminology and systems. * Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system. * Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft). * Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
Alex Lenk

Smartphones all the rage, says St George | The Australian - 2 views

  •  
    Rot October 15th Brief Article Analysis
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. St George Bank, the customers who use their services, 3. Identify and describe one ITGS social/ethical concern in the article. Reliability, the company and the customers depend on the new paying system developed by the company to perform reliably. 4. Describe ITGS terminology and systems. Applications: A piece of software that serves an auxiliary function for your electronic device IT: Short for information technology Internet: A large online server that stores information. Online: Being connected to a network. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
anonymous

Wolverton: Customers had more faith in Sony than it deserved - San Jose Mercury News - 3 views

  •  
    Are any corporate databases and networks safe? Should consumers be wary about providing personal data online? How valuable is data stored online? May 11 soo
  •  
    Are any corporate databases and networks safe? According to the article, they mentioned that no corporation databases are not completely safe and secure enough to protect personal information. There are too much false which makes network perfectly safe. It is very large storage and contains a lot of personal information. If the network is too big, they can't manage the network well and all the weaknesses will occur. The hackers will aim to hack the corporate databases because it has a lot of information therefore; it is not actually very safe. Should consumers be wary about providing personal data online? Yes, consumers should be wary about providing personal data online, because all services that store the online data are all under risk of being hacked, and the data compromised. Once the sensitive information is compromised, the user is more vulnerable to scam attacks through e-mails, as well as have their bank accounts or other user accounts online hacked. consumers should be a warning to be wary about providing personal data online because no corporate networks are frequently attacked by hackers and no matter how diligently their administrators work to protect them or how many protections are put n place, no network is perfectly secure. Even Sony' security systems are not perfect at all. Therefore, people have to be wary about providing personal data online How valuable is data stored online? Data stored online is very valuable, especially sensitive information such as ID numbers and bank/credit card numbers. Other personal data such as names, passwords, and security question answers are useful for hackers, and can be easily used for impersonation on other sites to hack into user accounts for further bad intentions.
  •  
    1. ITGS 2. Security 3. Sony 4. Database 5. Network 6. Digital net networking
anonymous

Hacking ring has stolen up to $1 billion from US, European banks, report says | Fox News - 6 views

  •  
    How do you steal a billion dollars? Wayne
anonymous

Smarter ways to pay | Bangkok Post: tech - 10 views

  • charge it to their credit cards simply by saying their names.
  • Starbucks is also investing $25 million (about 787 million baht) in Square as part of its latest round of financing, which values the company at $3.25 billion, and Howard Schultz, Starbucks' chief executive, will join Square's board. Starbucks has offered its own mobile payment app since last year and processes more than a million payments a week. Customers will continue to be able to use it, but they will also be able to use Pay With Square, Square's cellphone app, which eliminates even having to take the phone out of your pocket or sign a receipt.
  • At first, Starbucks customers will need to show the merchant a barcode on their phones. But when Starbucks uses Square's full GPS technology, the customer's phone will automatically notify the store that the customer has entered, and the customer's name and photo will pop up on the cashier's screen. The customer will give the merchant his or her name, Starbucks will match the photo and the payment will be complete.
  • ...3 more annotations...
  • challenge
  • Square, which was introduced in 2010, is one of many businesses _ like Google, PayPal, Sprint and Microsoft and start-ups like Scvngr and GoPago _ that are trying to offer mobile payments. But they have been slow to catch on as they require the cooperation of many players, including retailers, credit card firms, banks, phone carriers and phone makers.
  • compelling, safe and convenient experience for shoppers
  •  
    Article Analysis
anonymous

How Google could have made the Web secure and failed -- again | Common Sense Tech - CNE... - 1 views

  •  
    Describe IT Jason Oct 4
  •  
    Google have transfer you automatically to its "encrypted" service, one designed to prevent potential "eavesdropping" on your searches. Google have use SSL( secure socket layer) to protect your search. Is can also be use when you are logging on to your bank account online. Google have introduce the SSL search, with the SSL search you can do your searches on Google with more secure and you are in private so no one can see what are you searching. Before Google URL was HTTP/www.google.com but now it is HTTPS/www.google.com. Its secure now. Google have use SSL to help protect your data from unwanted access. So what you are connected to internet café, local hotspots or hotel your data will be secure. But Google is not responsible for any viruses you get over the internet searches. The SSL will only protect your personal information.
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
anonymous

Bangkok Post : Cloud services open up business opportunities - 1 views

  •  
    What does cloud computing deal with? Describe each of the characteristics cloud services must have. Explain horizontal and vertical services. Define each layer of services. Explain the infrastructure capability terms. Why is bandwidth important? march 17 cream
  •  
    What does cloud computing deal with? Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications. Describe each of the characteristics cloud services must have. Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them. Fstandard user interface - Web browsers to have access to the cloud services. Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human. Fservice metering - The Charge of the usage of the cloud services. Faccess over the internet - The medium of having access to the internet, as well as other places over the internet. Explain horizontal and vertical services. Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example. Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used. Define each layer of services. Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere. Why is bandwidth important? Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
  •  
    1.5 Intellectual property 2.5 Home and leisure 3.3 Networks 3.4 Internet 3.7 Databases
anonymous

China Tightens Electronic Censorship - NYTimes.com - 2 views

  • A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger
  • LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said
  • China’s censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary — like bans on Facebook, YouTube and Twitter — are now considered permanent. Government-friendly alternatives have sprung and developed a following
  •  
    This is similar to the Google accuses China... article and will help with the answers. Describe VPN. How does a proxy work? List a proxy you find useful. When would you use a proxy? Explain: Google has "played a role in manufacturing social disorder". march 25 Azman
  •  
    Describe VPN. A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet. How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946 List a proxy you find useful. Tor Trycatchme anonsafe When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information. Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
anonymous

Bangkok Post : Patient data need protection - 2 views

  •  
    Explain the issues and possible solutions. april 4 kuni
  •  
    The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
1 - 15 of 15
Showing 20 items per page