Skip to main content

Home/ Globaltech/ Group items tagged employee

Rss Feed Group items tagged

anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Identity Theft Resource Center ITRC Fact Sheet 102 - 0 views

  •  
    Select and list 5 guidelines you think are reasonable. May 9 az
  •  
    * Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms. * Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers. * Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis. * Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose. * Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.
anonymous

Bangkok Post : Galaxy Tab taps enterprise market - 6 views

  •  
    Define enterprise market. Describe 3 examples of increasing the productivity and efficiency of employees. dec 2 nat
  •  
    Define enterprise market. A different market to the consumer market, for an example, to companies and businesses so that they can use it for their business. Describe 3 examples of increasing the productivity and efficiency of employees. Car insurance - If there is an road accident, the insurance company can take pictures and send information through the tablet, without going back to the company to tell the information. Auto business - Customers can look at e-catalogs, where they can see the models easily because it is touch sensitive.
anonymous

iPhone Tracking Only Tip Of Security Iceberg -- InformationWeek - 1 views

  •  
    Explain what the following means: Miriam Wugmeister, chair of the global privacy practice at law firm Morrison & Foerster, echoes that assessment and stresses than employers should make it clear to employees that they can't expect privacy using corporate devices. While she observes that allowing employees to backup personal devices containing corporate data on a home computer could pose an e-discovery problem in the event of litigation, she also says there are good technical solutions that allow corporate IT administrators to create sandboxes that segregate personal and corporate communications. april 28 woo
  •  
    incomplete
anonymous

Companies test employees' susceptibility to hacks with fake emails - SiliconValley.com - 3 views

  •  
    How does phishing work? How should an organization protect itself from phishing? ad, sam, jh
anonymous

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 10 views

  •  
    List the precautions Mr. Lieberthal takes when visiting China. Define digital espionage. Why is it easy to steal information remotely? How was the US Chamber of Commerce hacked? Explain the reason for thwarting the cybertheft of trade secrets. all feb 16 soo paulo
  •  
    List the precautions Mr. Lieberthal takes when visiting China. * He leaves his cellphone and laptop at home. * He brings "loaner" devices. * He erases information before and after the trip. * He disables Bluetooth and Wifi. * He turns off his phone, and takes the battery out. * He only connects to the internet through an encrypted password protected channel. * He copies and pastes his password from a USB. Define digital espionage. Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen. Why is it easy to steal information remotely? Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information. How was the US Chamber of Commerce hacked? The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber. Explain the reason for thwarting the cybertheft of trade secrets. Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
Alex Lenk

Maybe Your Old Credit Cards Are Smart Enough - NYTimes.com - 3 views

  •  
    Jason October 17th  BAA
  •  
    1.Identify the area of impact the scenario relates to. Business and employee 2.Identify the main stakeholders to the IT system. The main stakeholder in this article is the credit cards company such as, Visa, MasterCard & American Express. The customer how are using these credit cards company service as well. 3.Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in the article is Reliability/ Security. In this article it talk about the old expired credit card that can be re-used again. Unwanted access and get a magnet chip/stripes of a credit card and still use it, to buy whatever they want. The magnet chip/stripes still provide some information of the conventional card. 4. Describe ITGS terminology and systems. PIN- A PIN is a 4-digit number that is used in combination with your Social Security Number, name, and date of birth to identify you as someone who has the right to access your own personal information Chips- is an integrated circuit in which all the components needed for a computer or other system are included on a single chip 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article When a customer uses their credit card to buy product from shops their must type in they PIN to continue the process and if the PIN is enter incorrectly the process cancels. This will allows the original card hold to buy the products only. Dynamics Inc recently unveiled smart-card technology that doesn't require a smart reader but could still require a PIN: the issuer could program the card so that the PIN has to be tapped on special buttons found on the card itself.
Azman Fadhilah

Lithium battery danger on planes sparks debate - Travel - News - msnbc.com - 0 views

  •  
    Why are batteries environmentally hazardous? Because lithium batteries contain metal that will spontaneously ignite if exposed to air. Also, the negative and positive poles on some lithium batteries are close together, leading more easily to short circuit which can cause fire. Explain the issue of safety versus cost. The issue of safety here is that if the lithium batteries are improperly package, damage or have manufacturing defects, they can short circuit and ignite. Overheated lithium batteries can blow the lids off steel shipping containers and damage a plane. Once a battery catches fire, the heat can set off other batteries. Obama administration proposed rules but they are opposed by many because they say the rules would cost them hundreds of millions of dollars in added packaging, paperwork and training for employees. It will also mean delays in getting medical equipment to patients and would drive up the cost of shipments.
1 - 9 of 9
Showing 20 items per page