Skip to main content

Home/ Globaltech/ Group items tagged from

Rss Feed Group items tagged

anonymous

Q&A: Google to Dig Deeper Into Users' Lives - ABC News - 9 views

  •  
    How will Google's privacy changes affect users? Explain the reasons for making the changes. Is there a way to prevent Google from combining the personal data it collects from all its services? Explain the users major complaint about Google's new privacy policy? How could the government regulate google's privacy changes?  all March 6 chut
  •  
    How will Google's privacy changes affect users? - When you are logged into Google, the data that you search into its search engine can be culled to suggest videos for you on YouTube. If you use Google Docs, Google will alert you if you misspelled your friends' names or co-workers' names. Google will collect information from its devices that you use to empower the company to connect the dots from one service to another. Explain the reasons for making the changes. - Google wants to make use of all of its companies that they own. Plus all the data that they collect from their users worldwide. Google wants to use their services to its full potential. They want to tell their users that they are not drawing the users' profiles for their profit only. Is there a way to prevent Google from combining the personal data it collects from all its services? - No there are no ways to prevent Google from combining the data that Google collects from its services. Unless you are not logged on to one of Google's products. Even if you are not logged onto one of Google's services Google can still keep track of you by your IP address instead of your name. if you are logged on and you do not wish to be tracked you can delete your browsing history. Explain the users' major complaint about Google's new privacy policy legal? - The users are not allowed to consent to or reject this new privacy policy. Each users have different setting for their privacy so this new change will not allow the users to use different set of rules. How could the government regulate Google's privacy changes? - The government is carefully looking over Google when it comes to handling personal information of the people. Google settled this argument with the governemtn when Google made a mistake by exposing their client's email accounts. Google's handling over personal information will be audited every other year and they are not allowed to make changes that are misleading or deceptive.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

Unmanned aerial warfare: Flight of the drones | The Economist - 7 views

  •  
    Summarize m12 nov 2 az
  • ...1 more comment...
  •  
    On September 30th, a missile strike launched from a UAV killed Anwar al-Awlaki, al-Qaeda's most effective propagandist. This was an example of how the UAV are changing today's combat. These babies are equipped with sophisticated sensors and carry Hellfire missiles and laser-guided bombs. There may not be a man in the cockpit, but each Reaper UAV requires more than 180 people to keep it flying. A pilot is always at the controls from a ground control unit and another officer operates its sensors and cameras. UAV have become the weapon of choice over the past decade. Theres not a month that passes without reports that an al-Qaeda or Taliban leader has been killed by UAVs. There are more hours flown by America's UAS than by its manned fighter jets and more pilots are being trained to fly them than their manned equivalents. The frequency of drone stikes on terrorists in Pakistan has rose from one every 40 days to one every four days under Obama's admin. The UAV's ability to loiter for hours, minutely observe human activities while transmitting full motion video to its ground crews and can strike with pinpoint accuracy has made it the essential weapon in America's war on terrorism. Drones come in many different shapes and sizes. Predators and Reapers are the larger and more popular ones. Some are micro sized devices that imitate a bird used for eavesdropping or a mid sized plane that can be hand launched by soldiers to tell them what is happening over the hill. The medium sized UAVs would be able to defend airspace against enemy intrusion to attacking enemy air defenses. The largest UAV would operate as airborne warning and control, aerial refueling tankers, lift transports and long range bombers. The next generation of drones will also have AI, which allows them to shoot to kill. The UAS are used for "dull, dirty, dangerous, difficult or different" tasks. These tasks include surveillance missions requiring time and a degree of persistence that crews of
  •  
    manned aircraft couldn't provide. Also, UAS could be used to fly in to observe or take samples after a chemical or biological attack. Any missions too dangerous for manned aircraft will be taken care of by the UAV. UAV have other advantages over manned aircraft as they have more detailed information about their targets, their strikes are more accurate and cause fewer civilian casualties. They are also cheaper and smaller. Since they have no pilot, the space could be used for fuel and thus they can fly much longer than manned aircraft. Without the need to accommodate crew, drone can be given radar-cheating stealthy shapes and can maneuver better. There are however a problem afflicting the drones as they depend on two-way satellite communications. If the datalink is broken the remote pilot will lose control of the aircraft. For missions requiring constant oversight, the vulnerability to electronic jamming or a direct attack on a communications satellite is a huge problem. Another problem is that the dones has a slight delay between the remote pilot and the aircraft. To reduce latency, small, solar, or laser powered ultra long endurance drones can form a chain in the sky along which satellite signals can be bounced. To reduce the workload on pilots, big UAV can take off and land automatically. The US Air Force plans to have a pilot operating up to four drones at a time. Civil liberty advocacy groups have raised concerns about targeted killings by drones. Bus as long as a UAS pilot can trust data from remote sensors, he or she should be able to make a proper assessment the same ways as the pilot of a manned aircraft. UAS pilot will be in a better position to do so since he or she will have more time to assess the situation accurately and not be exhausted b the physical battering of flying a jet.
  •  
    Allowing the UAV to fire a weapon based entirely on its own data analysis raises a lot of ethical problems. Using UAV to kill enemies thousands of miles away is like a cowardly action of a bully sheltering behind superior technology. There are fears that UAS will lower the political threshold for fighting and an essential of restraint will be removed. Drones make leaders fonder of war.
anonymous

US Report Blasts China, Russia for Cybercrime - ABC News - 15 views

  •  
    Identify the issue and scenario. Describe 3 incidents of cyberattacks by China. List some of the most desired data. Describe how the US is responding to these cyberthreats. all nov 10 kuni
  •  
    Identify the issue and scenario. China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies. Describe 3 incidents of cyberattacks by China. 1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists. 2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company. 3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies. List some of the most desired data. Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts. Describe how the US is responding to these cyberthreats. The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Learning The Right Lessons From The Amazon Outage - 5 views

  •  
    Define: AWS Iaas Define and describe: Free redundancy rapid scalability server failover maintainability Explain each lesson and determine whether you agree or not with each one. May 13 az
  •  
    1) Define: AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
anonymous

Sony suffers second major user data theft | Reuters - 1 views

  •  
    Explain what happened. Describe the issues. May 9 jen
  •  
    1.Explain what happened. Sony suffered a hack on their PC games network, which lead to theft of online user's data from its PlayStation video game network. The theft involved 77 million user information. Sony is now hiring various outside firms to investigate on the matter, and try to find the offenders to this hacking. Cyber-security detectives from Guidance Software and consultants from Robert Half International Inc's subsidiary Protviti were brought in to help with the clean-up. 2.Describe the issues. Issues from this includes the reliability and integrity, as well as the security of Sony's protection system and online user's sensitive information which include credit card numbers as well as passwords. The reliability is the reliability of Sony's software. It might have failed to function properly, thus being a loop hole of the hackers to get through. The integrity is keep users' data complete and unaltered without their permission by the hackers. There is also a privacy issue because user's sensitive data was stolen.
  •  
    1.2_security 2.1_online_bus 3.7_databases 3.6_multimedia_digital_media
anonymous

Net Cetera - OnGuard Online - 0 views

  •  
    Read Heads-up. Describe two guidelines from each section that you think are relevant advice. May 9 kuni
  •  
    Share with care Your online actions can have real-world consequences. The pictures you post and the words and the words you write can affect the people in your life. Think before you post and share. The advice, mainly for children, is that before you click to send email or when you're ready to post or send a message or a photo, download a file, game or program, or shop for something-stop for a second. Think about things like: Do you know and trust who you're dealing with-or what you're sharing or downloading? How will you feel if your information ends up somewhere you didn't intend? Get someone's okay before you share photos or videos they're in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy-and other people's-before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Interact With Tact Avatars are people too. When you're playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH TACT like you would in person. Remember that your character or avatar is a virtual version of you-what does it tell people about you and your interests? Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. The Protection Connection Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends-and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

A Look at the Growing "Work From Home" Phenomenon [INFOGRAPHIC] - 0 views

  •  
    cream
anonymous

A market for social-media data: Sipping from the fire hose | The Economist - 4 views

  •  
    Summary m12 oct 27 soo
  •  
    Currently many people are using social networking to express their thoughts and emotions. The most well known social networkings are Facebook and Twitter. Many people in the world post their status, most posts are not significant but some have valuable information. This posts are representing nation's mood. So some companies like DataSift and Gnip are using Twitter as data plaforms. These companies are colleting all the information from the Twitter. When people updates their status, these companies collect all the information from the status which contains some feedback about companies' products. This brings good effects to company however, others raised question of privacy concerns. The companies are not ask and get information to individuals, most of the users raised question about individual privacy.
anonymous

Download PDF Printer - 0 views

  •  
    makes pdf from print window
chaemin Nam

Lessons learned from Android security issues | www.mass360.com - 0 views

  •  
    Mobile device security requires persistence, diligence and, of course, common sense. In recent months, iOS and Android security have been hot topics of discussion in response to major breaches that impacted both operating systems this summer. their data breaches a legitimate but avoidable threat. In addition, software updates a necessity
Su Jung Woo

Security Enhancements in Android 4.2.2 - 0 views

  •  
    Android Security is enhanced by 'Jelly Bean' which has been refreshed with additional features such as preventing harmful apps from entering mobile device or blocking installation of bad apps.
Yonghyeon Shin

Privacy controls to be adopted by mobile phone operators - 1 views

  •  
    How does this program help users to protect your mobile phone? give us detail examples and provide specific reasons. 26 April Kuninari
  •  
    How does this program help users to protect their mobile phone? Give us detail examples and provide specific reasons. These guidelines (it's NOT a program) will help customers decide what data phone companies can collect about them. Customers will be able to allow or refuse phone companies from passing on personal data to other companies. These guidelines protect the customer, not the mobile phone. An example of an app which currently shares information without permission from the customer is "Girls Around Me" app.
anonymous

Big Data's Impact in the World - NYTimes.com - 9 views

  •  
    Explain why becoming a data consultant might be a good career choice. Why is data measurement considered to be the modern equivalent of the microscope? How has data-driven decision making improved productivity? How is Big Data transforming the way social networks function? all feb 21 max
  •  
    Explain why becoming a data consultant might be a good career choice. Basically, their jobs are to help businesses make sense of an explosion of data Web traffic and social network comments as well as software and sensors that monitor shipments, suppliers and customers. So, since a great number of people have used the Internet frequently, their jobs are needed to people because as much as people use the Internet, the data will be increased and people need other people who can manage such things. Why is data measurement considered to be the modern equivalent of the microscope? The reason is that there is countless data sensor around the world. The sensors can measure and communicate location, movement, vibration, temperature, humidity, even chemical changes in the air. How has data-driven decision making improved productivity? Data-driven decision making has improved productivity because people collect as much as data they can before deciding. As people doing that, they can predict preference of consumers from the Internet. It is very useful because people don't have to spend much time on consumers' preference also, a small amount of money and time will be spent. How is Big Data transforming the way social networks function? Social networks websites such as Facebook and Twitter and Search engines like Google and Answer.com make profit with their users' data. Many companies will buy the users' data from Facebook, Google, Answer.com and Twitter. That's a way to earn money for social network websites.
1 - 20 of 110 Next › Last »
Showing 20 items per page