Skip to main content

Home/ Globaltech/ Group items tagged networks

Rss Feed Group items tagged

anonymous

Bangkok Post : Virtual mall opens its doors - 3 views

  •  
    brief dec 2 cream
  •  
    Bangkok Post: Virtual mall opens its doors www.bangkokpost.com/...virtual-mall-opens-its-doors 1. Identify the area of impact the scenario relates to. Digital citizenship and people + machines / Home and leisure 2. Identify the main stakeholders to the IT system. Broadband technologies, 3D shopping, people individuals online shopping / Designer Companies, Online Shoppers, Ubermall 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. The ITGS terminology and systems is concerned to the virtual 3D online shopping. The site will allow shoppers to build new relationships by chatting with sellers and fellow customers. online 3D virtual world promoting businesses and tourist attractions that represent the country's "creative economy" policy. The new online shopping has opened in Thailand and it is likely 3D virtual mall. Shoppers can fill up their currency at anytime on the Internet by that currency software. 5. If possible, describe a solution to the concern (issue). The issue in this article is that this action will increase the economic issue and the business can increase their amount of products. " The company is also expanding its presence to Facebook, at apps.facebook. com/taraddotcom, in an effort to bring together its merchants and offer them the chance to sell their products through the world's most popular social network, in what is described as the first example of "social commerce" in Asia. However, there should be some security for payment online, which means that the site must be more secured in term of policy.
  •  
    1.2 Security 1.11 People and machines 2.5 Home and leisure 3.4 Internet 3.6 Multimedia/digital media
anonymous

France24 - New funding for Viewdle, which lets smartphones 'see' - 1 views

  •  
    brief dec 2 kuninari
  • ...1 more comment...
  •  
    1.11 2.5 home and leisure / 2.5_digital_entertainment 2.5_social_networking 3.1,3.2,3.3,3.4,3.5
  •  
    1. Identify the area of impact the scenario relates to. The area of impact is people and security on the machine. 2. Identify the main stakeholders to the IT system. The main stakeholder is security 3. Describe one ITGS social/ethical concern in the article. The concern is about the people and machines were there are problem with the recognitions on people 4. Describe ITGS terminology and systems. public transfer information systems is the information that will justify the people who is using on account to find whether people is using account on their own or using other person's account. 5. If possible, describe a solution to the concern (issue). It might need some more technology to fix the problem on recognitions that people can be use on other account or people can't use it even they are on their own account. They should be able to find the difference on fake also, like people using photo on other person to log in to their account.
  •  
    Kuni, you're suppose to upload your answers IN class. Just remember that for next time.
anonymous

http://edition.cnn.com/2010/TECH/web/12/13/5.online.privacy.tips/ - 6 views

  •  
    summary march 29 kuni
  •  
    1. Adjust social-network privacy settings, You should adjust privacy setting in Facebook by changing the privacy option in Facebook. Facebook updated its privacy dashboard in October, which now, it can change the privacy setting in mobile phone, and you don't have to do it in computer. You can also protect twitter to not let show in the public. 2. Ensure personal data is sent over a secure connection, You should find if the site is secured enough before giving a credit card number. Make sure the adress shows that the site is encrypted. 3. Consider opting out of ad tracking, You should get rid of ad tracking by disabling the third party cookies. Now, no one will be able to track your pc. 4. Use private Web browsing features or install a VPN Install VPN for more strong security for your browser. Such as Little Snich, which gives out a warning sign every time the website automatically changes your settings. 5. Think before you post. You should always check and think if the site is secured enough to give out a privacy information or post email. You have to be careful to not let hackers get into your computer. And don't give out privacy information even to friends.
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Book Review - The Net Delusion - By Evgeny Morozov - NYTimes.com - 3 views

  • the ­asocial pursuit of profit is what drives social media
  • more capricious technology” than radio or television
  • capricious technology” than radio or television. Neither radio nor TV has “keyword-based filtering,” which allows regimes to use URLs and text to identify and suppress dangerous Web sites, or, like marketers, to collect information on the people who visit them
  • ...5 more annotations...
  • “Technology changes all the time,” he writes, “human nature hardly ever.”
  • Mass journalism and democracy are inextricably entwined
  • The Net Delusion
  • Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters
  • For more on “The Net Delusion,”
  •  
    Feb 22 Does the Net allow more freedom or does is it a tool for governments and business to control us? Jenny
  •  
    1.7_surveillance 2.6_pol_gov 3.4_internet
  •  
    Does the Net allow more freedom or is it a tool for governments and businesses to control us? The Net allows both. The users can roam freely to their discretion where and what they want to put onto the web. It is just a matter of a country censoring the content, or the user self-censoring what is to be put on the web. Also, the governments and businesses both can use the Net to their advantage. The government can learn and find out various information of various individuals and trends of the public through the Net's social networking websites and other portal that have discussion between citizens themselves. Business are able to keep track of trends to see what is happening, such as the stock prices to what people like to eat, listen to, what they like to use. Thus the businesses are able to stay in business a little easier through knowing the information from the web. The businesses can also advertise themselves through the net, and that way, it is actually faster than having actual offline campaigns and advertisement. Therefore, the net can allow us both. We are free to use it more than let it control us. It's just a matter of fact that higher class society, social ranking, or economic status-ed has more chances to controlling the net due to their connections with the higher ups. Yet, censorship and surveillance is everywhere, and thus doesn't allow absolute freedom.
anonymous

Home - The home of Spybot-S&D! - 3 views

  •  
    Azman - Is this any good?
  •  
    I don't think so. The site looks very unprofessional and it doesn't look legitimate at all. A company that is not well known rates most of the awards that they won. It could be pretty good software but since it's free, there will be downsides and restrictions to it; and users need to be careful when installing freeware.
anonymous

http://venturebeat.com/2011/02/20/arab-revolts-another-good-week-for-social-media-a-bad... - 1 views

  • The protests have been spurred by extensive use of social media such as Facebook and Twitter, which are seeing their moment in the sun as the tools of revolution
  • They’re unleashing movements for peace, democracy and freedom in a region of the world that seemed like it was content to live without them
  • It shows that the power of the network effect can work in political revolutions just as it does in other parts of our lives. Social media has become like the lever that opens the doors that stand in the way of freedom
  • ...1 more annotation...
  • “triumphalism about the recent events in the Middle East is premature. The contest is still in its early stages, and the new age of internet-driven democratization will endure only if we learn to counter the sophisticated measures now being developed to quash it
  •  
    To what extent do you think social media opens the door to freedom? march 1
anonymous

Internet blackouts: Reaching for the kill switch | The Economist - 2 views

  • cost Egypt as much as $90m
  • enforced closure of the internet can backfire
  • crudely disconnecting cables risks outrage elsewhere
  • ...2 more annotations...
  • And cutting international cables leaves a country’s internal connections intact
  • Egypt’s blackout had plenty of chinks
  •  
    What were the chinks in the blackout? What are problems with cutting national and international cables? Explain the possible financial impact of blackouts. How can a blackout backfire? march 11 kuni
  •  
    What were the chinks in the blackout? Many people abroad offered the Egyptians internet though the terrestrial phone system, which was basically a dial-up system. Moreover, Google and Twitter launched a service where users can voicemail their tweets, which is then converted into text, to publish their tweets online. What are problems with cutting national and international cables? It will cost a lot in budget and maybe some damage too, because it is complex and expensive to build and run a kill switch. Explain the possible financial impact of blackouts. The financial, impacts the finance of the blackouts are that money transactions and deposits are affected by the suddenly cut line, which may cause problems to both local individuals as well as large companies that are trying to seal a business deal between each other. An intergovernmental think-tank in paris predicts that the cost of damage in Egypt for its network shutdowns was around $90million. Also, other international countries that are trying to invest in the country that has a blackout are most likely to rethink their decision, and take their investing plans to another more stable country. This affects the country as the whole since they will be losing investors in their country. This would also affect the economy as rates change, the amount of people (tourists) flowing in and out of the country including business groups. How can a blackout backfire? A blackout can backfire its government because it can cause the citizens to view the government's act in a bad way. Cutting of connections will people will stop trusting its government, and would want to overthrow their leader/government. Moreover, This is somewhat a loss for the government. They wouldn't want their citizens to go up against them. Thus, citizens play a major role on how a blackout can backfire. The cutting internet doesn't help at all.
anonymous

SecurID Company Suffers Security Breach - NYTimes.com - 1 views

  •  
    brief march 29 kuninari
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to the company who are selling product on security to the other company that need a security, and they got suffered. Business 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system are company and government who uses secuID 3. Describe one ITGS social/ethical concern in the article. The Data Breach in this article refers to their security system data being violated by an outside offender, such as it being stolen or copied when it's not supposed to be. The advanced cryptographic system is the security system that has an extra layer of security by an electronic token authenticator that generates a time-based number for the users to input while logging in with their password. It is suspected that the master key for the encryption algorithm was stolen, which is the huge secret number that is part of the system. 4. Describe ITGS terminology and systems. SecurID- a mechanism developed by RSA Security for performing two-factor authentication for a user to a network resource 5. If possible, describe a solution to the concern (issue). The solution for this issue is to update the security system often and try to get against from hackers. Having SecurID make up a new algorithm to be used for the system could reinforce the system's security again, if it's possible to make up a new algorithm. Other than that, SecurID would probably have to make up a whole new security system since their current stolen algorithm is probably going to be published and recopied, and the system not secure anymore.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Glassboard. Private group sharing done right. - 3 views

anonymous

Intelligent Vehicle Network Technology VLU | Bus Rapid Transit | Intelligent Bus Monito... - 0 views

  •  
    Jenny
anonymous

When Passwords Aren't Enough: The Need for Strong Online Authentication That is Easy to... - 2 views

  •  
    Describe the IT terms. april 28 kuni
  •  
    Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain. Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
anonymous

Identity Theft Resource Center ITRC Fact Sheet 118 - 0 views

  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. may 9 cream
  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company. Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information! You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
  •  
    1.3 Privacy and anonymity 3.3 Networks 3.4 Internet 3.5 Personal and public communications
anonymous

Net Cetera - OnGuard Online - 0 views

  •  
    Read Heads-up. Describe two guidelines from each section that you think are relevant advice. May 9 kuni
  •  
    Share with care Your online actions can have real-world consequences. The pictures you post and the words and the words you write can affect the people in your life. Think before you post and share. The advice, mainly for children, is that before you click to send email or when you're ready to post or send a message or a photo, download a file, game or program, or shop for something-stop for a second. Think about things like: Do you know and trust who you're dealing with-or what you're sharing or downloading? How will you feel if your information ends up somewhere you didn't intend? Get someone's okay before you share photos or videos they're in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy-and other people's-before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Interact With Tact Avatars are people too. When you're playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH TACT like you would in person. Remember that your character or avatar is a virtual version of you-what does it tell people about you and your interests? Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. The Protection Connection Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends-and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in
anonymous

BBC News - Rise in UK requests for Google content removal - 8 views

  •  
    Describe 3 examples of legitamate cases for removal. all oct 31 kuni
  •  
    i. Critical Politician movement: Google remove 236 communities and profiles from social network in India after the government complained that they were critical of a local politician. ii. Privacy violation: The users in Turkey were restricted from being able to see material about the private lives of political officials. iii. Local law violation: There was a problem that in Thailand, where someone uploads the video that insulted Thailand's monarchy, which was illegal under local laws. This caused the user in Thailand to ban YouTube site for a year.
« First ‹ Previous 61 - 77 of 77
Showing 20 items per page