What is DR?
- Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions
What is problem with Laissez-Faire DR?
- The problem with Laissez-Faire DR is data loss Laissez-Faire DR can't do anything when you data are hacked
What are the advantages and disadvantages using cloud on DR?
- One of the advantages of using cloud on DR is it is easy to access. You just need a computer to access your data.
- Disadvantage for using cloud on DR is lack of back up. When you lose your data, your data can be lost.
Iran has been forced to disconnect key oil facilities after suffering a malware attack on Sunday, say reports. The computer virus is believed to have hit the internal computer systems at Iran's oil ministry and its national oil company. Equipment on the Kharg island and at other Iranian oil plants has been disconnected from the net as a precaution.
Suggest ways to prevent pop-up windows.
Why do travelers are seem to be a good target for hackers?
How did the hackers hack travelers' laptop?
What are the solutions to this attack?
How does the SSL secure the connection?
Explain the issue with Path.
When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends.
Evaluate Apple's solution.
Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information.
Should services such as Path take or hold our data?
I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
How did they attack?
- By using emails that are attatched with viruses, they attacked Norway's industrial secrets and information using their hacked network. However, none of the anti-malware software detect these emails.
What was stolen?
- Industrial drawings, user names, passwords, contracts negotiation and documents were stolen from the attack.
Describe a possible solution
- The whole attack was from "viruses." Which means that the company should feel necessary to have another stronger and higher quality of anti-malware software. When it detects things properly and more clearly, that means more possibility of defending the attacks that might happen in the future.
1. Identify the area of impact the scenario relates to.
The area of impact the scenario relates to is 'business and employment'.
2. Identify the main stakeholders to the IT system.
The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers.
3. Identify and describe one ITGS social/ethical concern in the article.
The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system.
4. Describe ITGS terminology and systems.
* Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system.
* Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft).
* Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet.
5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
1. Identify the area of impact the scenario relates to.
This article is related to Heath problems
2. Identify all the ITGS terminology and phrases (IT and Social/Ethical)
Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera
3. Describe one ITGS social/ethical concern in the article.
Internet access and privacy problems, digital divide and internet access equality
4. Describe the relationship of the main stakeholders to the IT system.
Main stakeholders : doctors, patients
Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing.
5. Explain the relationship between the IT system and the social/ethical issue identified in question 3.
The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable.
6. Discuss at least one problem that relates to the impacts of the social/ethical issue.
The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives.
7. Evaluate one solution that addresses the problem identified.
A solution that has been done is
1. How might the internet be useful for the Egyptian citizens?
Egyptian citizens, especially for the protesters, have organized the initial protests against the government online, through social media such as Facebook groups. The restored Internet would allow them to use to do so again and other citizens are now back to their computers and can have regular socialization online. A main ways of communication with the outside world as well as with themselves, Internet would allow the citizens to join together through websites on the internet to create groups that support what they think is best for them. In this case, they want a reelection from their current leader.
2. What does it mean "bring down Egyptian websites"?
"Bring down Egyptian websites" means to stop access to those Egyptian websites through means such as having a DoS attack on the website. Also hackers can hack into the website and destroy the coding and content of the website and thus "bring down" the websites. Bringing down Egyptian websites can also mean that they are blocking all access to Egypt because there wouldn't be any portal into Egypt if all the Egyptian websites are brought down.
It is designed to stop the U.S.A. from being attacked cyberly like from hackers, criminals, and spies.
It is a critical issue because if someone hacked the united states then they would be able yo launch missiles and begin a war that never should have been started also they could gain access to information that should be secret and not shared with the world.
To stop secure certificates means to temporarily stop issuing authentication certificates to secure websites because the certificates have been compromised meaning that people's personal confidential information has been stolen. It was done to investigate the claims of a hacker that he had issued false certificates. It was suggested that personal emails in Iran and government emails in Holland had been compromised, probably for political reasons.
The issue is that the increasing integration of medical devices in hospital networks can increases the risk of being attacked easily, which they hack into the network and steals information. They need to strengthen the security to get against with the possibility of virus attacks which could have a huge damage on delivering data for medication. The Public Health Ministry can play an important role as a regulator in healthcare security, as a same system with the security in the network banking.
1. How can iphone be hijacked?
The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. The iPhone can be hijacked through a series of invisible SMS message bursts that hijacks the iPhone. The attacker would then be able to control all the functions on the iPhone, as well as continue to send messages to hijack more phones.
2. How can a user tell if she is being SMS attacked?
The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. A user can tell if she is being SMS attacked if they receive a message containing a square character. Prevention measures include immediately turning off your iPhone.
Why were the customers spooked?
Why is this a problem?
Describe consolidated.db. Check this link: tracking and recording your location data.
How is apple collecting geodata?
Why is apple collecting geodata?
Explain the problems with collecting geodata.
Could law enforcement in America be able to subpoena these types of records from people's iPhones or iPads?
april 26
cream
How can iphone be hijacked?
The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone.
How can a user tell if she is being SMS attacked?
The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones.
Just turn off your iphone right away!
1. Identify the area of impact the scenario relates to.
Business, Home and Leisure
2. Identify the main stakeholders to the IT system.
UK Telco BT, NewBinz2 pirate link sharing website and users, MPA (Motion picture association)
3. Identify one ITGS social/ethical concern in the article.
Intellectual property
4. Describe ITGS terminology and systems.
ISP - Internet Service Provider, is a company that collects monthly or yearly fee in exchange for providing the subscriber with Internet Access. The Terms of Service contract of the ISP will also state rules about hacking, protecting copyrighted materials, denial of service attacks, harassing other people, spam compromising the service, and many other issues. These are as much for the legal protection of the ISP as to let potential subscribers know what the ISP will and will not tolerate.
5. If possible, describe a solution to the concern (issue).
NewBinz pirate link sharing website is essential site for various users who wish to download illegally copied materials. However, this action concerns as infringe laws and copyright among policies. Thus, This is why NewBinz would be permanently block by ISP. However, the fact is that online users are very active so the creative industries should maintain about this not just blocking the sites.