Skip to main content

Home/ Globaltech/ Group items tagged identity

Rss Feed Group items tagged

anonymous

Identity Theft Resource Center ITRC Fact Sheet 102 - 0 views

  •  
    Select and list 5 guidelines you think are reasonable. May 9 az
  •  
    * Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms. * Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers. * Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis. * Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose. * Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.
anonymous

Digital self-defence | Bangkok Post: lifestyle - 0 views

  •  
    summary
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
anonymous

BBC News - Trendnet security cam flaw exposes video feeds on net - 6 views

  •  
    How was the system hacked? Describe possible solutions. all feb 13 hyojeon
  •  
    How was the system hacked? - Shodan search engine which specializes in finding online devices that could be used to discover cameras vulnerable to the flaw. - People set the camera with an own password, it video stream became accessible to anyone who typed in the correct net address. This consisted of the user's IP address followed by an identical sequence of 15 characters. The camera captures people password and IP address. This will invade camera users' privacy. Describe possible solutions. - The Trednet has to foster its network system and try to do their security system that they have to make new firmware and update which resolves the vulnerability of its cameras.
anonymous

Your Facebook Posts, Gift-Wrapped In Identity, Will Soon Be Given To Marketers | TechCr... - 2 views

  •  
    Brief article analysis.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

BBC News - Australia's central bank targeted by hackers - 2 views

  •  
    Eun Young  October 17th  BAA
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to is 'business and employment'. 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers. 3. Identify and describe one ITGS social/ethical concern in the article. The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system. 4. Describe ITGS terminology and systems. * Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system. * Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft). * Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
anonymous

Web Browser Privacy Check - 8 views

  •  
    Try it. Explain the purpose of this site. What does *) mean? all aug 30 Az
  •  
    Explain the purpose of this site. The purpose of this site is to inform users what security related information is exposed by the web browser to any website that the users visited. This website can also be used to judge how effectively your identity is hidden if you are accessing the site via a proxy or a VPN. What does *) mean? The items marked with the asterisk will be most likely to be recorded by web servers.
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

When Passwords Aren't Enough: The Need for Strong Online Authentication That is Easy to... - 2 views

  •  
    Describe the IT terms. april 28 kuni
  •  
    Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain. Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
anonymous

Identity Theft Resource Center ITRC Fact Sheet 118 - 0 views

  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. may 9 cream
  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company. Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information! You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
  •  
    1.3 Privacy and anonymity 3.3 Networks 3.4 Internet 3.5 Personal and public communications
1 - 11 of 11
Showing 20 items per page