- Identify the area of impact the scenario relates to
Home and Leisure, Business and e-commerce
- Identify the main stakeholders to the IT system
People who are using Facebook, Facebook Company and Application Company
- Identify one ITGS social/ethical concern in the article
Security, Privacy
- Describe ITGS terminology and systems
Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.
http://developers.facebook.com/docs/guides/canvas/
Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.
http://kb.iu.edu/data/agzf.html
- If possible, describe a solution to the concern (Issues)
Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
1. Identify the area of impact the scenario relates to.
Security
2. Identify the main stakeholders to the IT system.
The hacking group which is called 'Turkguvenligi' and seven victims (Sites)
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web.
DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs.
NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP.
NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite.
SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose,
SELECT count(user_id) from USER_TB where user_id='test' and pw='1234'
(Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack.
5. If possible, describe a solution to the concern (issue).
Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
1. Identify the scenario.
Business
2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article.
Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites.
3. Describe the IT concepts and processes.
Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website.
IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location.
(DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.)
SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed.
http://msdn.microsoft.com/en-us/library/ms161953.aspx
4. Explain the relationship between the IT system referred to in the article and the concern presented above.
The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database.
5. Describe and evaluate the impact of a social/ethical issue on the stakeholders
The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT.
6. Explain and evaluate one solution to the issue identified.
A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
Explain the issues that are in common with both Amazon and Sony?
Explain the reasons that cloud computing will continue to grow?
What could have prevented Sony from getting hacked?
Describe:
Rambo architecture
Chaos monkey
Explain the reason that data centers for cloud computing need backups?
may 9
woo
1. Explain the issues that are in common with both Amazon and Sony?
Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people.
2. Explain the reasons that cloud computing will continue to grow?
Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself.
3. What could have prevented Sony from getting hacked?
Sony could have increased its protection system, as well as create random simulations in orde
Explain why becoming a data consultant might be a good career choice.
Why is data measurement considered to be the modern equivalent of the microscope?
How has data-driven decision making improved productivity?
How is Big Data transforming the way social networks function?
all
feb 21
max
Explain why becoming a data consultant might be a good career choice.
Basically, their jobs are to help businesses make sense of an explosion of data Web traffic and social network comments as well as software and sensors that monitor shipments, suppliers and customers. So, since a great number of people have used the Internet frequently, their jobs are needed to people because as much as people use the Internet, the data will be increased and people need other people who can manage such things.
Why is data measurement considered to be the modern equivalent of the microscope?
The reason is that there is countless data sensor around the world. The sensors can measure and communicate location, movement, vibration, temperature, humidity, even chemical changes in the air.
How has data-driven decision making improved productivity?
Data-driven decision making has improved productivity because people collect as much as data they can before deciding. As people doing that, they can predict preference of consumers from the Internet. It is very useful because people don't have to spend much time on consumers' preference also, a small amount of money and time will be spent.
How is Big Data transforming the way social networks function?
Social networks websites such as Facebook and Twitter and Search engines like Google and Answer.com make profit with their users' data. Many companies will buy the users' data from Facebook, Google, Answer.com and Twitter. That's a way to earn money for social network websites.
Explain the problem and solution.
How should you Choose a Laptop for Your Small Business?
How can you Recover a Lost Phone, Tablet, or Laptop?
How can you Stop Laptop Theft?
all
march 13
Kevin
1. Identify the area of impact the scenario relates to.
The area of impact the scenario relates to is 'business and employment'.
2. Identify the main stakeholders to the IT system.
The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers.
3. Identify and describe one ITGS social/ethical concern in the article.
The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system.
4. Describe ITGS terminology and systems.
* Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system.
* Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft).
* Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet.
5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
The IT system in this is wireless repeaters they simply repeat the wireless signal that the router sends out so that a larger area can be covered by a single signal.
It solves the problem of having to spend money for more routers and also having to constantly change your signal when you move around a large area like a park because you would lose one signal while gaining another.
=D
1. Identify the area of impact the scenario relates to.
Business, E-commerce
2. Identify the main stakeholders to the IT system.
Online Newspaper companies, newspaper subscribers
3. Identify one ITGS social/ethical concern in the article.
Globalization
4. Describe ITGS terminology and systems.
- Groupon: a deal-of-the-day website that is localized to major geographic markets worldwide. Launched in November 2008, the first market for Groupon was Chicago.
- LivingSocial: an international social buying company based in Washington, D.C. They specialize in daily deals offered in cities across the United States, as well as in Canada, Europe and Australia.
- TimeLiimited: is a service just like Groupon, which emails its readers on special offers for travel and living terms
The New York Times newspapers are going to start using the internet, and connection of the companies to its subscribers for a fee to their advantage, even though there is a slim chance now. It is the spread of public communication of news, the latest trends, and discounts to events and merchandise while connecting directly to personal communication means of its subscribers (through their e-mails).
5. If possible, describe a solution to the concern (issue).
Straightforward copying Groupon is not the answer for the success online. The New York times might be able to have a chance against Groupon and LivingSocial, but these two big groups have already topped the business of connecting companies with deals to its customers and subscribers for a fee. The companies should be able to manage connection between merchants and their customers. The New York Times would have to come up with special deals that appeal to users, such as a subscription discount, so on, and so forth to grab customers' attention from Goupon and LivingSocial to the New York Time's TimesLimited. The process involves sending people e-mail offers and discounts from companies and service providers, then charging a fee for
What does cloud computing deal with?
Describe each of the characteristics cloud services must have.
Explain horizontal and vertical services.
Define each layer of services.
Explain the infrastructure capability terms.
Why is bandwidth important?
march 17
cream
What does cloud computing deal with?
Cloud computing deals with all the technology and support for the infrastructure of the cloud such as networking, database, storage, and management applications.
Describe each of the characteristics cloud services must have.
Fshared services (with standard framework and shared application programming interface (API)) - these services can be shared in order for all users to have access to them.
Fstandard user interface - Web browsers to have access to the cloud services.
Fself-service - Users must help themselves by self service when it comes to doing cloud services since actions are carried over the computer, not from human to human.
Fservice metering - The Charge of the usage of the cloud services.
Faccess over the internet - The medium of having access to the internet, as well as other places over the internet.
Explain horizontal and vertical services.
Horizontal Services - cloud applications, cloud storage, cloud servers, and cloud collaboration. These horizontal services are the services that are spread around horizontally as the infrastructure, and the base of the cloud service. It provides the technology and memory for clouds for example.
Vertical Services - government services, cloud entertainment, cloud publishing and online ad networks, cloud healthcare, and cloud telecommunications. These vertical services are basically what we use the cloud services for, which field they are in, and how they are used.
Define each layer of services.
Infrastructure as a Service (IaaS) - This is a service usually from outsourcing done by an organization so that the actual infrastructure to hold the storage, hardware, and other components are stored elsewhere.
Why is bandwidth important?
Internet bandwidth will drive the popularity of cloud services in the country, as businesses and consumers will demand more services as bandwidth increases. Speedy network reliability is needed for "megabit-per-second" services.
1. Identify the area of impact the scenario relates to.
Business, government
2. Identify the main stakeholders to the IT system.
US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center
3. Indentify on ITGS social/ethical concern in the article.
Reliability, People and machines
4. Describe ITGS terminology and systems.
Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform.
HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently.
Exoskeleton: outer layer that help covers, supports and protect the soldier body.
Are any corporate databases and networks safe?
Should consumers be wary about providing personal data online?
How valuable is data stored online?
May 11
soo
Are any corporate databases and networks safe?
According to the article, they mentioned that no corporation databases are not completely safe and secure enough to protect personal information. There are too much false which makes network perfectly safe. It is very large storage and contains a lot of personal information. If the network is too big, they can't manage the network well and all the weaknesses will occur. The hackers will aim to hack the corporate databases because it has a lot of information therefore; it is not actually very safe.
Should consumers be wary about providing personal data online?
Yes, consumers should be wary about providing personal data online, because all services that store the online data are all under risk of being hacked, and the data compromised. Once the sensitive information is compromised, the user is more vulnerable to scam attacks through e-mails, as well as have their bank accounts or other user accounts online hacked.
consumers should be a warning to be wary about providing personal data online because no corporate networks are frequently attacked by hackers and no matter how diligently their administrators work to protect them or how many protections are put n place, no network is perfectly secure. Even Sony' security systems are not perfect at all. Therefore, people have to be wary about providing personal data online
How valuable is data stored online?
Data stored online is very valuable, especially sensitive information such as ID numbers and bank/credit card numbers. Other personal data such as names, passwords, and security question answers are useful for hackers, and can be easily used for impersonation on other sites to hack into user accounts for further bad intentions.