What is DR?
- Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions
What is problem with Laissez-Faire DR?
- The problem with Laissez-Faire DR is data loss Laissez-Faire DR can't do anything when you data are hacked
What are the advantages and disadvantages using cloud on DR?
- One of the advantages of using cloud on DR is it is easy to access. You just need a computer to access your data.
- Disadvantage for using cloud on DR is lack of back up. When you lose your data, your data can be lost.
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Photo illustration of keyboard with both Roman letters and Chinese "radicals" or "particles" - parts of Chinese charactures.
SAN FRANCISCO - Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
Haier's Gaze TV uses technology developed by Tobii, a Swedish firm which already offers eye-tracking technology for computers.Users control the set by staring at the top or bottom of the screen to activate a user-interface.
- this technology is that the normal video communicate that by the internet to connect to each other. For example, Skype, or Facetime etc.
Advantages and disadvantages.
- The advantage is that when children want to learn some music but parents don't have time to drive them to the music school, they could have lessons at home which is easy to do.
- The disadvantage is that we need many thing to learn via computer, for example, webcam or video camera, good quality speaker, good quality microphone etc.
Mobile devices can be occupied by malware that are no longer only exist in the computer. With the growing population of smart phones, it also increases chance of getting viruses, worm, or Trojan. These viruses can invade by number in fonts, SMS or MMS messaging, downloadable content, public Wi-Fi or Bluetooth connections.
Mobile malware can cause serious problems. They can drain your phone's battery very fast, delete your important information such as contacts or messages, and also it can destroy your phone's function completely. The worst thing it could do is to display your personal images online.
How to provide mobile security?
Use anti-virus software
You can keep your mobile phone secured by using mobile security software such as Kaspersky Mobile Security. This software is a complete protection that will keep away malwares and block threatening network connections. It also has many features such as control of private contacts and phone numbers, blocking accession of other people, and an mobile phone locator application in case it get lost or stolen.
Works Cited
http://www.cellphonebeat.com/10-security-software-smart-phone.htmlhttp://linestechnology.blogspot.com/2011/06/overcoming-mobile-virus.htmlhttp://expertitgurus.blogspot.com/2011_05_01_archive.html
Identify the issue and scenario.
Describe 3 incidents of cyberattacks by China.
List some of the most desired data.
Describe how the US is responding to these cyberthreats.
all
nov 10
kuni
Identify the issue and scenario.
China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies.
Describe 3 incidents of cyberattacks by China.
1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists.
2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company.
3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies.
List some of the most desired data.
Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts.
Describe how the US is responding to these cyberthreats.
The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
1. Identify the area of impact the scenario relates to.
Business and employment, home and leisure
2. Identify the main stakeholders to the IT system.
in this article, the credit card user and credit card companies are the main stakeholder
3. Identify and describe one ITGS social/ethical concern in the article.
In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card.
4. Describe ITGS terminology and systems.
Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another
Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations.
Hardware - the collection of physical elements that comprise a electrical device system
5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern.
Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
1.Identify the area of impact the scenario relates to.
Business and employee
2.Identify the main stakeholders to the IT system.
The main stakeholder in this article is the credit cards company such as, Visa, MasterCard & American Express. The customer how are using these credit cards company service as well.
3.Identify and describe the ITGS social/ethical concerns in the article.
The social/ethical concern in the article is Reliability/ Security. In this article it talk about the old expired credit card that can be re-used again. Unwanted access and get a magnet chip/stripes of a credit card and still use it, to buy whatever they want. The magnet chip/stripes still provide some information of the conventional card.
4. Describe ITGS terminology and systems.
PIN- A PIN is a 4-digit number that is used in combination with your Social Security Number, name, and date of birth to identify you as someone who has the right to access your own personal information
Chips- is an integrated circuit in which all the components needed for a computer or other system are included on a single chip
5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article
When a customer uses their credit card to buy product from shops their must type in they PIN to continue the process and if the PIN is enter incorrectly the process cancels. This will allows the original card hold to buy the products only.
Dynamics Inc recently unveiled smart-card technology that doesn't require a smart reader but could still require a PIN: the issuer could program the card so that the PIN has to be tapped on special buttons found on the card itself.
1. The area of impact that the scenario relates to the Prgivacies that people can visit to the other people's profiles and view histories to find what the other person done in the past.
2. This is related to the Databases where Google stores the information on profile and history that what they had done. It is also related to surveillance
3. There is the problem with the privacy and anonymity that people can have access to the other persons profile to see their actions in the past. Most companies do this in career test for finding some inappropriate action that the person has done.
4.The database is a collection of information stored in an organized form in a computer.
Program helps keep track of corporate passengers
5. For sollution, it might be helpfult to use proxy to get away from google tracking accounts.
Gmail tips summary
Basically, Gmail gives you a plenty of space to storage for example 7 gigabytes for free, which is already a lot. Even though you are running out of the space. You are able to get more spaces for just $5 per year, is quite cheap.
What is so good about Gmail?
The most useful feature is that you can link your other email account, AOL, Yahoo, or Hotmail right away to your Gmail, which means you do need to open up many email to check your Inbox.
a) You can set up filters to skip the Inbox and go right to the folder or a trash can.
b) If you happen to find some information that is quite old, Gmail uses GooGle search engine to allow you to find it easily.
c) Gmail offers " canned message" You can set up a filter so that a certain type of email always gets a canned response.
WikiLeaks Hit with DoS Attack Before Documents Leaked
1. Identify the area of impact the scenario relates to.
Politics and Employment
2. Identify the main stakeholders to the IT system.
WikiLeaks, Government, users
3. Identify one ITGS social/ethical concern in the article
Privacy
4. Describe ITGS terminology and systems.
Wikileaks is simply a website that spread the hidden news to the public so it is like a non-profit website. They spread the news throughout the Internet. WikiLeaks knew and predicted such DoS attacks, they have been switching various IP address in order to keep running the website.
5. If possible, describe a solution to the concern (issue).
Users need to use encryption for preventing hackers.
Using secure private network in order to protect your private network or make it even more authorized.
Using firewall to protect your computer form unauthorized access
Why won't tablets replace PCs?
Tablets are recommended, but won't replace PCs because they aren't made to carry out tasks that PCs are capable of doing. Tablets may be useful when looking at emails or searching the web, but it's not easy to use when typing up word documents. They will be handy to have it next to your PC, but it will never be your primary computer.
1. The cloud has been around for a while
Summary about the cloud
Many people are doing their own business everywhere around the world and they need something that can communicate with their customers, workers, and many other people. We call these communicating systems as Clouding. For example, currently there is phone call, emails and messaging systems are examples of clouding system. When people are using clouding system, they have to care about backup system to protect their files from losing.
To have good clouding system, people need connection of Internet to send or receive their emails with cell phones or laptops. Then people should have their free email accounts like G-mail or Yahoo. Theses free email accounts allow large attachments and people can access theses emails everywhere. Unfortunately, business user who has Google or Yahoo accounts with their company name should pay a small annual fee. These systems are all cloud. People are using clouding computing already.