aNt
Feb 4
Why did Egypt block the internet?
How has the internet supported civil disobedience?
What does it mean when the US says social media is a fundamental right?
Why did Egypt block the internet?
To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication.
How has the internet supported civil disobedience?
Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know.
What does it mean when the US says social media is a fundamental right?
US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
1. Identify the area of impact the scenario relates to.
Business, Home and Leisure
2. Identify the main stakeholders to the IT system.
UK Telco BT, NewBinz2 pirate link sharing website and users, MPA (Motion picture association)
3. Identify one ITGS social/ethical concern in the article.
Intellectual property
4. Describe ITGS terminology and systems.
ISP - Internet Service Provider, is a company that collects monthly or yearly fee in exchange for providing the subscriber with Internet Access. The Terms of Service contract of the ISP will also state rules about hacking, protecting copyrighted materials, denial of service attacks, harassing other people, spam compromising the service, and many other issues. These are as much for the legal protection of the ISP as to let potential subscribers know what the ISP will and will not tolerate.
5. If possible, describe a solution to the concern (issue).
NewBinz pirate link sharing website is essential site for various users who wish to download illegally copied materials. However, this action concerns as infringe laws and copyright among policies. Thus, This is why NewBinz would be permanently block by ISP. However, the fact is that online users are very active so the creative industries should maintain about this not just blocking the sites.
If passed, it would "accelerate" the net down a path that could lead to governments everywhere sanitising online content so citizens only get what those in power think they should see...
What does this mean?
may 19
nat
This means that once the bill passes, the government will have control, and block any sites that they think people should not see, and this quote is saying that the people will only be able to see what the government approves of, leaving them with no freedom on the internet.
Android Security is enhanced by 'Jelly Bean' which has been refreshed with additional features such as preventing harmful apps from entering mobile device or blocking installation of bad apps.
Mobile devices can be occupied by malware that are no longer only exist in the computer. With the growing population of smart phones, it also increases chance of getting viruses, worm, or Trojan. These viruses can invade by number in fonts, SMS or MMS messaging, downloadable content, public Wi-Fi or Bluetooth connections.
Mobile malware can cause serious problems. They can drain your phone's battery very fast, delete your important information such as contacts or messages, and also it can destroy your phone's function completely. The worst thing it could do is to display your personal images online.
How to provide mobile security?
Use anti-virus software
You can keep your mobile phone secured by using mobile security software such as Kaspersky Mobile Security. This software is a complete protection that will keep away malwares and block threatening network connections. It also has many features such as control of private contacts and phone numbers, blocking accession of other people, and an mobile phone locator application in case it get lost or stolen.
Works Cited
http://www.cellphonebeat.com/10-security-software-smart-phone.htmlhttp://linestechnology.blogspot.com/2011/06/overcoming-mobile-virus.htmlhttp://expertitgurus.blogspot.com/2011_05_01_archive.html
1. Identify the area of impact the scenario relates to.
Business and Employment
2. Identify the main stakeholders to the IT system.
Amazon and companies using Amazon's cloud service
3. Identify one ITGS social/ethical concern in the article
Reliability
4. Describe ITGS terminology and systems.
The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones.
Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud.
Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers.
Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance.
http://aws.amazon.com/
5. If possible, describe a solution to the concern (issue).
A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
Identify the issue and scenario.
Describe 3 incidents of cyberattacks by China.
List some of the most desired data.
Describe how the US is responding to these cyberthreats.
all
nov 10
kuni
Identify the issue and scenario.
China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies.
Describe 3 incidents of cyberattacks by China.
1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists.
2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company.
3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies.
List some of the most desired data.
Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts.
Describe how the US is responding to these cyberthreats.
The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
BRUSSLES can't block users from downloading illegally because that would breach the EU rules. SABAM asked the court in Belgian to force scarlet to install a device to prevent users from downloading copyrighted work. Scarlet then had to install the device. The EU made a statement that that internet providers should have to install a filtering system. The ruling of that made the BEUC (consumer organization) get authorities thinking of a fairer way to provide legal downloads.
Monique Goyens said that there is no point in trying to catch individual people for file sharing because there are so many it would be impossible to stop.
EU - European Union
SABAM - Belgian Society of Authors, Composers and Publishers
BEUC - European Union Consumers Organisation
Net neutrality: principle of internet service providers should not block customers that pay less to give faster speeds to those who pay more.
Verizon says, FCC is not following the principle(net neutrality) so they argued to FCC with the order called "Preserving the Free and Open Internet".
Basically, verizon is arguing to FCC; Why FCC is not following the principle, and they should follow it.
inventor Sir Tim Berners-Lee, have said that everyone should have the right to a free and open internet.
1. Identify the area of impact the scenario relates to.
Business, Home and leisure,
2. Identify the main stakeholders to the IT system.
The main stakeholders of the Internet users and the internet advertisement provider (such as Google)
3. Identify and describe one ITGS social/ethical concern in the article.
A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around?
4. Describe ITGS terminology and systems.
Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web.
Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
I would use Google Sketchup, because this is one of the applications that I have on my computer. Google Sketchup is a software with which you can make a 3D model easily. Compared to the other 3D modeling software, Google Sketchup is easier to use. It has some tutorials for beginners, and you will find out how easy it is to create 3D model like a kid making a tower of blocks. Also, if you buy it, you will be able to convert it to a file that can be used for other 3D modeling software and modding games.
I would use Google Trends just to see what's trending and Flight simulator in Google earth sounds pretty fun for when you're bored.
I would use ; Google Page Creator, Flight simulator in Google Earth, and SketchUp.
I would use the fight simulator, because it looks fun, and SketchUp mainly because I've always wanted to do some sort of graphics design on the computer.
-In my opinion I would like to use Google SketchUp, and Google Book Search. First of all Google Sketch Up is helping me to make 3-D model. This is very useful in art class because when we have something like installations, we need some sketch of location and installation therefore by this program, I can draw 3-D installation and see how it looks like therefore this program is very useful for me. Also For the Google Book Search, this is kind of digital library which I can find book very easily and efficiently. I can see the books by this program also I can upload by own books which I can scan it. Therefore it might be very useful when I have something like writing essays.
I would use Google Page creator. It enables to me create a page where I can find snippets of web pages, quotes, and images all over the web.
Because shutting down the internet means shutting down their ability to communicate freely which is inhumane, corrupt, and immoral. The impact on the economy alone would be reason to never implement such measure.
Describe BGP
- BGP is the border gateway protocol, the protocol at the core of the internet's routing mechanism. BGP performs interdomain routing in Transmission-Control Protocol/Internet Protocol (TCP/IP) networks. BGP is an exterior gateway protocol (EGP), which means that it performs routing between multiple autonomous systems or domains and exchanges routing and reachability information with other BGP systems.
- Control the pathways
How does the BGP affect ISPs?
- BGP glues all
ISPs and their large customers together to form the Internet. Besides traditional routing, BGP also supports
routing for new IP services such as Multiprotocol Label Switching Virtual Private Network (MPLS VPN).
- Without BGP information provided by Egyptian networks, the rest of the world has no way to connect with the country's ISPs or its Web sites. Nor do its citizens have a way to reach sites or services beyond its boundaries.
- "The Egyptian government has instructed the ISPs whether state owned or sate licensed, to withdraw their BGP announcements that tell other routers how to reach those ISPs"
-
1. How might the internet be useful for the Egyptian citizens?
Egyptian citizens, especially for the protesters, have organized the initial protests against the government online, through social media such as Facebook groups. The restored Internet would allow them to use to do so again and other citizens are now back to their computers and can have regular socialization online. A main ways of communication with the outside world as well as with themselves, Internet would allow the citizens to join together through websites on the internet to create groups that support what they think is best for them. In this case, they want a reelection from their current leader.
2. What does it mean "bring down Egyptian websites"?
"Bring down Egyptian websites" means to stop access to those Egyptian websites through means such as having a DoS attack on the website. Also hackers can hack into the website and destroy the coding and content of the website and thus "bring down" the websites. Bringing down Egyptian websites can also mean that they are blocking all access to Egypt because there wouldn't be any portal into Egypt if all the Egyptian websites are brought down.
Now, though, realizing that they could no longer hide their abuses from a world
a Twitter tweet away, the new model autocracies, such as Libya and Bahrain
have realized that they need to cut their Internet links before bringing out the
guns.
As in Bahrain, Libya’s Internet is essentially owned and controlled by the
government through a telecommunication company Libya
Telecom & Technology
Mobile phone services in Libya are also under the control of the government. So
far though the government doesn’t seem to have cut international phone services
off-perhaps because that’s harder to do without cutting off local telephone
service.
Identify the area of impact the scenario relates to.
Politics and government
Identify the main stakeholders to the IT system.
Libyan government, Libyan citizens, Libyan telecommunication company (Libya Telcom & Technology)
3. Identify one ITGS social/ethical concern in the article.
Surveillance
4. Describe ITGS terminology and systems.
Internet : a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
Bit.ly : URL shortening is a technique on the World Wide Web where a provider makes a web page available under a very short URL in addition to the original address.
Top level domain : A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name.
5. If possible, describe a solution to the concern (issue).
It is hard to suggest a solution basically because it is the government's decision to shut down the internet. Therefore the only way to solve this issue is to discourage dictatorship in Libya. Main reason for the shut down of the internet was the cooperation of Libya Telecom & Technology which is owned by the dictator's son.
What evidence does Google present for Chinese government censorship?
How does this impact the Jasmine revolution?
Describe LinkedIn.
Why was LinkedIn disrupted?
What are the 7 International Safe Harbor Privacy Principles?
Explain the major criticism of this system (International...)?
Explain "self-censorship is a non-negotiable legal requirement".
Explain "China's political elite have a love hate relationship with the internet".
march 25
woo
1. What evidence does Google present for Chinese government censorship?
Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government.
2. How does this impact the Jasmine revolution?
The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly.
3. Describe LinkedIn.
LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection.
4. Why was LinkedIn disrupted?
LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
A host of evidence over the past several weeks shows that Chinese authorities
are more determined than ever to police cellphone calls, electronic messages,
e-mail and access to the Internet in order to smother any hint of antigovernment
sentiment. In the cat-and-mouse game that characterizes electronic
communications here, analysts suggest that the cat is getting bigger
LinkedIn, a networking platform, was blocked for a day during the height of
government concerns over Internet-based calls for protests in Chinese cities a
few weeks ago, he said
China’s censorship machine has been operating ever more efficiently since
mid-2008, and restrictions once viewed as temporary — like bans on Facebook,
YouTube and Twitter
— are now considered permanent. Government-friendly alternatives have sprung and
developed a following
This is similar to the Google accuses China... article and will help with the answers.
Describe VPN.
How does a proxy work?
List a proxy you find useful.
When would you use a proxy?
Explain: Google has "played a role in manufacturing social disorder".
march 25
Azman
Describe VPN.
A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet.
How does a proxy work?
By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden.
Article Source: http://EzineArticles.com/3786946
List a proxy you find useful.
Tor
Trycatchme
anonsafe
When would you use a proxy?
When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information.
Explain: Google has "played a role in manufacturing social disorder".
This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government.
Describe the following terms and explain possible solutions:
drive-by downloads
clickjacking
targeted brand attacks on social networks
MitB (Man-in-the-Browser)
MitMo (Man-in-the-Mobile)
advanced on-the-fly SSL hacking
may 23
soo
drive-by downloads
Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing.
Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on.
http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledgehttp://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html
Clickjacking
Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users.
A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content.
https://www.owasp.org/index.php/Clickjacking
Targeted brand attacks on social networks
Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen