Skip to main content

Home/ Globaltech/ Group items tagged issues

Rss Feed Group items tagged

anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
In Hee Jang

Report warns of Android security issues, increased malware, Web attacks - 1 views

  • “Malware writers have become increasingly creative with the tactics they use to get users to download malware,” Mahaffey wrote in a blog entry announcing the report. “Monetary motivations seem to be the primary goal, but the sheer amount of personal information stored in our smartphones also becomes a target for attackers to get creative.”
  •  
    San Francico based mobile security vendor announced that there is a lack of android security issues which increases malware and web atatcks.
anonymous

In Piracy Debate, Is the Sky Falling? - NYTimes.com - 29 views

  •  
    Why are copyright violations a serious problem? Describe two advantages and two issues with illegitimate downloading. Explain two possible solutions to this kind of piracy. all feb 13 chut
  •  
    *Why copyright violations are serious problem?
  •  
    Why are copyright violations are a serious problem? Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem. Describe two advantages and two issues with illegitimate downloading. One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality. An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue. Explain two possible solutions to this kind of piracy. One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
anonymous

Correction: Facebook-Privacy Q&A story - The Washington Post - 10 views

  •  
    How does Facebook use the information people share to make money? Describe the issues that Facebook should address. all Dec 6 cream
  •  
    How does Facebook use the information people share to make money? Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money. Describe the issues that Facebook should address. Issues that Facebook should address include: Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online. Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Amazon Malfunction Raises Doubts About Cloud Computing - NYTimes.com - 2 views

  •  
    Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. Why is the cloud model gaining popularity? List the problems that companies reported. april 28 az
  •  
    1) Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. One of the issues is that Amazon need to reconsider the contracts that cover cloud services such as how much to pay for backup and recovery services, including paying extra for data centers in different locations. The reason for this is because small businesses are less apt to pay for extensive backup and recovery services. The second issue would be many companies are relying too much on remote computers that are beyond their control. So they need to reconsider that also. The technical problem that interrupted computer services provided by Amazon told its customers and users that there may be a reliability problem with Amazon's service in online computing in the cloud. Companies and businesses operation network now revolves a lot around these remote network systems, so this also affects how companies will reconsider their use of exporting their files and data as opposed to keeping them within the company walls. 2) Why is the cloud model gaining popularity? Because owning a data center is high maintenance and therefore expensive. By using the cloud model, companies are avoiding the costs and headaches of running their own data centers. They just simply tap in, over the Web, to computer processing and storage without owning the actual machines or operating software. Businesses can also save their time by outsourcing to the cloud to save having to keep track of running their own data centers. 3) List the problems that companies reported. ( Unable to access data Service interruptions Sites being shut down
anonymous

Sony suffers second major user data theft | Reuters - 1 views

  •  
    Explain what happened. Describe the issues. May 9 jen
  •  
    1.Explain what happened. Sony suffered a hack on their PC games network, which lead to theft of online user's data from its PlayStation video game network. The theft involved 77 million user information. Sony is now hiring various outside firms to investigate on the matter, and try to find the offenders to this hacking. Cyber-security detectives from Guidance Software and consultants from Robert Half International Inc's subsidiary Protviti were brought in to help with the clean-up. 2.Describe the issues. Issues from this includes the reliability and integrity, as well as the security of Sony's protection system and online user's sensitive information which include credit card numbers as well as passwords. The reliability is the reliability of Sony's software. It might have failed to function properly, thus being a loop hole of the hackers to get through. The integrity is keep users' data complete and unaltered without their permission by the hackers. There is also a privacy issue because user's sensitive data was stolen.
  •  
    1.2_security 2.1_online_bus 3.7_databases 3.6_multimedia_digital_media
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
Alex Lenk

Apple to address security issues in iOS 6.1.2 update in the next week or so | 9to5Mac - 0 views

  •  
    This talks about how vulnerable the current update is with security in IOS. Apple is trying to fix this with a new update. 
Dawoon Jung

Patch issued for Java loopholes - 1 views

  •  
    Oracle has issued a patch for loopholes in its Java program that was being actively abused by cyber-thieves. The software giant took the unusual step of issuing the patch well before the usual date for security updates. The patch closes loopholes that together left users of almost every operating system vulnerable to infection by viruses.
  •  
    What is Java used for ????????
anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
Azman Fadhilah

Lithium battery danger on planes sparks debate - Travel - News - msnbc.com - 0 views

  •  
    Why are batteries environmentally hazardous? Because lithium batteries contain metal that will spontaneously ignite if exposed to air. Also, the negative and positive poles on some lithium batteries are close together, leading more easily to short circuit which can cause fire. Explain the issue of safety versus cost. The issue of safety here is that if the lithium batteries are improperly package, damage or have manufacturing defects, they can short circuit and ignite. Overheated lithium batteries can blow the lids off steel shipping containers and damage a plane. Once a battery catches fire, the heat can set off other batteries. Obama administration proposed rules but they are opposed by many because they say the rules would cost them hundreds of millions of dollars in added packaging, paperwork and training for employees. It will also mean delays in getting medical equipment to patients and would drive up the cost of shipments.
anonymous

Google Jumps Into Fashion E-Commerce - WSJ.com - 2 views

  •  
    brief nat nov 22
  •  
    1. Identify the area of impact the scenario relates to. Business, leisure 2. Identify the main stakeholders to the IT system. Google Inc., users in the US. 3. Identify one ITGS social/ethical concern in the article. Security. 4. Describe ITGS terminology and systems. Boutiques.com : It is like amazon or ebay, and it directs shoppers to site where it can be purchased. Merchants pay them if the shopper buy the goods or click on it to learn more about it. 5. If possible, describe a solution to the concern (issue). Because it is on the internet, attention has to be paid to the issue of security. If any users buy anything, they would need to pay online by their credit cards, and some may feel reluctant to give credit card information online. To diminish this issue, Google will have to ensure a secure system where datas of each customers are kept safe and not misused.
anonymous

Bangkok Post : Virtual mall opens its doors - 3 views

  •  
    brief dec 2 cream
  •  
    Bangkok Post: Virtual mall opens its doors www.bangkokpost.com/...virtual-mall-opens-its-doors 1. Identify the area of impact the scenario relates to. Digital citizenship and people + machines / Home and leisure 2. Identify the main stakeholders to the IT system. Broadband technologies, 3D shopping, people individuals online shopping / Designer Companies, Online Shoppers, Ubermall 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. The ITGS terminology and systems is concerned to the virtual 3D online shopping. The site will allow shoppers to build new relationships by chatting with sellers and fellow customers. online 3D virtual world promoting businesses and tourist attractions that represent the country's "creative economy" policy. The new online shopping has opened in Thailand and it is likely 3D virtual mall. Shoppers can fill up their currency at anytime on the Internet by that currency software. 5. If possible, describe a solution to the concern (issue). The issue in this article is that this action will increase the economic issue and the business can increase their amount of products. " The company is also expanding its presence to Facebook, at apps.facebook. com/taraddotcom, in an effort to bring together its merchants and offer them the chance to sell their products through the world's most popular social network, in what is described as the first example of "social commerce" in Asia. However, there should be some security for payment online, which means that the site must be more secured in term of policy.
  •  
    1.2 Security 1.11 People and machines 2.5 Home and leisure 3.4 Internet 3.6 Multimedia/digital media
Woogyeong Jung

The changing landscape of online fraud: Long life spam | The Economist - 2 views

  •  
    article analysis march 25 soobin
  •  
    1. Identify the area of impact the scenario relates to. -- Leisure, Business 2.Identify all ITGS terminology and phrases (IT and Social/Ethical) -- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives. 3.Describe one ITGS social/ethical concern in the article. --Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers. 4.Describe the relationship of the main stakeholders to the IT system. ---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. -- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Congressmen, Facebook go back and forth over personal data sharing - 3 views

  •  
    brief analysis march 7 kuni
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is that personal information about people using a site such as Facebook is being made available to businesses. Even with the safeguards and agreements put in place to stop spammers there have already been cases of misuse of information. This is particularly worrying if personal information about children and young people is being made available. 2. Identify the main stakeholders to the IT system. The main stakeholders are the person who uses the Facebook, and they are having the businesses by the games and the system on making money from them. They use the work on creating the privacy issues 3. Describe one ITGS social/ethical concern in the article. The ITGS social/ethical concern is that there are problem on the information that can be shared on the third parties, which will have problem on the privacy issues where you could get stolen your information. 4. Describe ITGS terminology and systems. App- Protocols seen by user programs, such as email and the web API- is an interface implemented by a software program to enable interaction with other software, similar to the way a user interface facilitates interaction between humans and computers. ... 5. If possible, describe a solution to the concern (issue). Facebook have strict policy on collection regarding the companies collecting information from users as well as a harsher punishment instead of just a 6 month suspension. The change of policies should be notified to every users and the team should ask for the agreement of general users.
anonymous

BBC News - Apple acts on iPhone tracking bug - 1 views

  •  
    How does apple propose to solve the tracking program? Describe two examples of data tracking services that people use. Do you think privacy is still an issue with phones and apps? May 17 cream
  •  
    1. How does apple propose to solve the tracking program? Apple released newly developed software that cuts the amount of stored data to just a week and no longer transfer it to the owner's computer when the phone is connected. And if users disable the location services setting on their iPhone or iPad, it will stop collecting data completely. 2. Describe two examples of data tracking services that people use. - Foursquare: Foursquare is a location-based social networking website based on software for mobile devices. - Mobile Me: Mobile Me automatically pushes new email, contacts, and calendar events to your iPhone, Mac, and PC. So your devices always stay in perfect sync. 3. Do you think privacy is still an issue with phones and apps? Of course yes because mobile devices are connected to networks for all the time in order to access to files and media. Privacy is always going to be an issue with phones and apps because even though Apple is storing data for shorter time, the stored data can be used or leaked anytime when threats attack.
  •  
    1.1_reliability_integrity 1.3_privacy_anonymity 2.5_home_leisure 3.1_hardware 3.2 _software 3.3_networks 3.4_internet
anonymous

BBC News - Cyber security plan proposed by White House - 1 views

  •  
    Explain what the cyber security plan is designed to do. Why is this a critical issue? May 17 alec
  •  
    It is designed to stop the U.S.A. from being attacked cyberly like from hackers, criminals, and spies. It is a critical issue because if someone hacked the united states then they would be able yo launch missiles and begin a war that never should have been started also they could gain access to information that should be secret and not shared with the world.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
1 - 20 of 75 Next › Last »
Showing 20 items per page