1. Identify the area of impact the scenario relates to.
Security
2. Identify the main stakeholders to the IT system.
The hacking group which is called 'Turkguvenligi' and seven victims (Sites)
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web.
DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs.
NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP.
NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite.
SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose,
SELECT count(user_id) from USER_TB where user_id='test' and pw='1234'
(Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack.
5. If possible, describe a solution to the concern (issue).
Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
1. Identify the scenario.
Business
2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article.
Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites.
3. Describe the IT concepts and processes.
Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website.
IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location.
(DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.)
SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed.
http://msdn.microsoft.com/en-us/library/ms161953.aspx
4. Explain the relationship between the IT system referred to in the article and the concern presented above.
The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database.
5. Describe and evaluate the impact of a social/ethical issue on the stakeholders
The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT.
6. Explain and evaluate one solution to the issue identified.
A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
The universe of apps has made life more convenient, more fun and more distracting. For example, you can find your lover. But in truth, most apps are designed for those whose life is already convenient. According survey there are total of 1.4 million people with disabilities in thailand. Worldwide, there are many apps which help facilitate the lives of physically impaired.
1. TTRS MESSAGE.
This service allows people with hearing or speech impairment to place calls to standard telephone users via a keyboard or assistive device. TTRS operators interpret the calls, which can be initiated by either party. Callers use a text input device to contact the TTRS relay centre, then give the operator the number of the party he or she wants to call. The operator, in turn, will place an outbound traditional voice call to that particular party. The operator serves as a link between the two callers, relaying the text of the initial caller in voice to the other party, as well as converting spoken words to text. The service was first offered only via desktop and kiosk platforms, but it is now available to mobile users via an app.
2.Read for the blind.
Wichai Pornpratang, vice president of telecommunications business at Thai Samsung Electronics, said the main technology used to develop this app is a voice recorder which records users reading. Those audio files are uploaded to the Thai Blind People Foundation's server. Then converted to DAISY3 books to achieve an acceptable level of audio quality. With this format, users can serach for and regulate reading voices, make duplicates and place bookmarks.
3.Wheel Go Round
It is windows phone application for wheelchair users that locates and rates the nearest wheelchair accessible facilities such as parking areas, elevators, ramps and toilets.
The app also allows users to take photos and add places where facilities for those in wheelchairs are available. It is great benefit, but the app could be improved if it allowed users to scan for t
Questions:
How does TTRS work?
What is benefit of RFB?
how can you improve wheel go round?
What special techonolgy does Traffic voice information service have?
1. Describe the IT terms.
Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention.
http://www.whatspatented.com/http://arstechnica.com/gadgets/
Cloud-based - software systems that based on the cloud (internet)
Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database.
http://www.wisegeek.com/what-is-voice-recognition.htm
Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned.
Automated voicemail - Automatic voicemail system that stores voice messages.
Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands).
http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars
Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps.
http://code.goo
I would use Google Sketchup, because this is one of the applications that I have on my computer. Google Sketchup is a software with which you can make a 3D model easily. Compared to the other 3D modeling software, Google Sketchup is easier to use. It has some tutorials for beginners, and you will find out how easy it is to create 3D model like a kid making a tower of blocks. Also, if you buy it, you will be able to convert it to a file that can be used for other 3D modeling software and modding games.
I would use Google Trends just to see what's trending and Flight simulator in Google earth sounds pretty fun for when you're bored.
I would use ; Google Page Creator, Flight simulator in Google Earth, and SketchUp.
I would use the fight simulator, because it looks fun, and SketchUp mainly because I've always wanted to do some sort of graphics design on the computer.
-In my opinion I would like to use Google SketchUp, and Google Book Search. First of all Google Sketch Up is helping me to make 3-D model. This is very useful in art class because when we have something like installations, we need some sketch of location and installation therefore by this program, I can draw 3-D installation and see how it looks like therefore this program is very useful for me. Also For the Google Book Search, this is kind of digital library which I can find book very easily and efficiently. I can see the books by this program also I can upload by own books which I can scan it. Therefore it might be very useful when I have something like writing essays.
I would use Google Page creator. It enables to me create a page where I can find snippets of web pages, quotes, and images all over the web.
What were the chinks in the blackout?
What are problems with cutting national and international cables?
Explain the possible financial impact of blackouts.
How can a blackout backfire?
march 11
kuni
What were the chinks in the blackout?
Many people abroad offered the Egyptians internet though the terrestrial phone system, which was basically a dial-up system. Moreover, Google and Twitter launched a service where users can voicemail their tweets, which is then converted into text, to publish their tweets online.
What are problems with cutting national and international cables?
It will cost a lot in budget and maybe some damage too, because it is complex and expensive to build and run a kill switch.
Explain the possible financial impact of blackouts.
The financial, impacts the finance of the blackouts are that money transactions and deposits are affected by the suddenly cut line, which may cause problems to both local individuals as well as large companies that are trying to seal a business deal between each other. An intergovernmental think-tank in paris predicts that the cost of damage in Egypt for its network shutdowns was around $90million. Also, other international countries that are trying to invest in the country that has a blackout are most likely to rethink their decision, and take their investing plans to another more stable country. This affects the country as the whole since they will be losing investors in their country. This would also affect the economy as rates change, the amount of people (tourists) flowing in and out of the country including business groups.
How can a blackout backfire?
A blackout can backfire its government because it can cause the citizens to view the government's act in a bad way. Cutting of connections will people will stop trusting its government, and would want to overthrow their leader/government. Moreover, This is somewhat a loss for the government. They wouldn't want their citizens to go up against them. Thus, citizens play a major role on how a blackout can backfire. The cutting internet doesn't help at all.